This Week in Security: Geopolitical Hacktivism, Antivirus Mining, and Linux Malware

The CIA Hacktivists have launched a sort of ransomware campaign against the Belarusian rail system, but instead of cryptocurrency, they want the release of political prisoners and removal of Russian …read more Continue reading This Week in Security: Geopolitical Hacktivism, Antivirus Mining, and Linux Malware

Zhengbang Pick & Places Your Confidential Data In The Bag, Slowly

A Zhengbang Pick&Place machine, with a Virustotal 53/69 result and "53 security vendors and 1 sandbox flagged this file as mailcious" crudely overlaid on top of the image

Isn’t it convenient when your pick-and-place machine arrives with a fully-set-up computer inside of it? Plug in a keyboard, mouse and a monitor, and you have a production line ready …read more Continue reading Zhengbang Pick & Places Your Confidential Data In The Bag, Slowly

Identifying Malware by Sniffing its EM Signature

The phrase “extraordinary claims require extraordinary evidence” is most often attributed to Carl Sagan, specifically from his television series Cosmos. Sagan was probably not the first person to put forward …read more Continue reading Identifying Malware by Sniffing its EM Signature

Glitch Your Way to Reverse-Engineering Glory with the PicoEMP

PicoEMP EMFI tool

Most of our projects are, to some extent, an exercise in glitch-reduction. Whether they’re self-inflicted software or hardware mistakes, or even if the glitches in question come from sources beyond …read more Continue reading Glitch Your Way to Reverse-Engineering Glory with the PicoEMP