Unpacking the spyware disguised as antivirus

Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation, the malware was used to dox 400,000 members of Vietnam Airlines.Categories: Malware
Threat analysisTags… Continue reading Unpacking the spyware disguised as antivirus

PokemonGo Ransomware comes with some clever tricks

We have all seen the current popularity and craze with PokemonGo, it’s no surprise cyber-criminals would plan on using this to their advantage and imitate the game with malicious substitutions. Categories: Malware
Threat analysisTags: malwarepokemonpo… Continue reading PokemonGo Ransomware comes with some clever tricks

Shakti Trojan: Technical Analysis

Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible attribution has led us to the conclusion that this threat is in reality not new – probably it has been designed in 2012 for the purpose of corporate espionage operations. Yet it escaped from…

Categories:

Tags:

(Read more…)

Continue reading Shakti Trojan: Technical Analysis

Shakti Trojan: Document Thief

Recently, Bleeping Computer published a short article about an unrecognized Trojan that grabs documents from the attacked computer and uploads them into a malicious server. Looking at the characteristics of the tool, we suspect that it has been prepared for the purpose of corporate espionage. So far, no AV has given any meaningful identification to this malware—it is detected under generic names. Since not much is known about its internals, we decided to take a closer look.

Categories:

Tags:

(Read more…)

Continue reading Shakti Trojan: Document Thief