A New Wave of Buggy WordPress Infections

We’ve been following an ongoing malware campaign for the past couple of years now. This campaign is renowned for its prompt addition of exploits for newly discovered WordPress theme and plugin vulnerabilities.
Every other week, the attackers int… Continue reading A New Wave of Buggy WordPress Infections

Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

Reading Time: 4 minutes If CISOs could make one cybersecurity issue vanish, malware would top the list. While there’s no silver-bullet solutions, the world of magic offers insights for effective malware prevention.

The post Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention appeared first on Security Intelligence.

Continue reading Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

Magento Skimmers: From Atob to Alibaba

Last year we saw a fairly massive Magento malware campaign that injected credit card stealing code similar to this:
It uses the JavaScript atob function to decode base64-encoded domain names and URL patterns. In the sample above, it’s hxxps://li… Continue reading Magento Skimmers: From Atob to Alibaba

How to obfuscate the structure of an encrypted directory to an outsider while maintaining the original directory structure to the intended user?

I am currently working on a form of backup software that supports encryption but also maintains the directory structure of the encrypted files and folders so that it is also decryptable and easily accessible on mobile. The pr… Continue reading How to obfuscate the structure of an encrypted directory to an outsider while maintaining the original directory structure to the intended user?

Are there types of malware that are so time-intensive to detect that AV vendors simply choose to not detect them?

I’ve been reading a lot about how AVs use different heuristic methods to detect obfuscated malware and it seems like some of these methods are very time/processor intensive. For example, to detect encrypted malware AVs will s… Continue reading Are there types of malware that are so time-intensive to detect that AV vendors simply choose to not detect them?