Remove automated-malware-analysis
article thumbnail

ELFEN: Automated Linux Malware Analysis Sandbox

Penetration Testing

ELFEN: Linux Malware Analysis Sandbox ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform both static and dynamic analysis.

Malware 92
article thumbnail

DuneQuixote campaign targets the Middle East with a complex backdoor

Security Affairs

The experts detected only two CR4T implants, but they speculate the existence of many other variants which may be completely different malware. The threat actors behind the DuneQuixote campaign took steps to prevent collection and analysis the implants through the implementation of practical and well-designed evasion methods.

Malware 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Synopsys takes aim at software supply chain risks

InfoWorld on Security

Synopsys has introduced Black Duck Supply Chain Edition , a software composition analysis (SCA) package that helps organizations mitigate upstream risk in software supply chains, including from AI code.

article thumbnail

iShutdown lightweight method allows to discover spyware infections on iPhones

Security Affairs

The analysis revealed that the infections left traces in the Shutdown.log, which is a text-based log file. ” reads the analysis published by Kaspersky. The analysis of the infections also revealed other similarities such as the path associated with malware execution (“/private/var/db/”). ” concludes Kaspersky.

Spyware 121
article thumbnail

North Korea ATM Hack

Schneier on Security

government partners, CISA, Treasury, FBI, and USCYBERCOM identified malware and indicators of compromise (IOCs) used by the North Korean government in an automated teller machine (ATM) cash-out scheme­ -- referred to by the U.S. The level of detail is impressive, as seems to be common in CISA's alerts and analysis reports.

Hacking 296
article thumbnail

Synopsys takes aim at software supply chain risks

InfoWorld on Security

Synopsys has introduced Black Duck Supply Chain Edition , a software composition analysis (SCA) package that helps organizations mitigate upstream risk in software supply chains, including from AI code.

article thumbnail

Researchers find new ICS malware toolkit designed to cause electric power outages

CSO Magazine

A new addition to this arsenal is a malware toolkit that seems to have been developed for red-teaming exercises by a Russian cybersecurity company. COSMICENERGY is the latest example of specialized OT malware capable of causing cyber physical impacts, which are rarely discovered or disclosed," the Mandian researchers said in their report.

Malware 111