Remove anti-forensics-techniques
article thumbnail

The activity of the Linux XorDdos bot increased by 254% over the last six months

Security Affairs

XorDdos leverages persistence mechanisms, efficient evasion, and anti-forensic techniques, including obfuscating the malware’s activities, evading rule-based detection mechanisms, and hash-based malicious file lookup. Microsoft experts observed in the last six months a 254% increase in the activity associated with XorDdos. .

DDOS 97
article thumbnail

Chinese Attackers Use New Rootkit in Long-Running Campaign Against Windows 10 Systems

eSecurity Planet

The Kaspersky researchers first wrote about GhostEmperor in July and rolled out another blog this week. With a long-standing operation, high-profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the underlying cluster GhostEmperor,” they wrote in the latest blog. Rootkit Uses Cheat Engine Scanner.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSA 2022 Musings: The Past and The Future of Security

Anton on Security

An anti-DDoS vendor promised “better zero trust visibility.” spotted “forensics as code”, “cloud governance as code”, “detection as code” and a few others. I’ve seen decent examples of how companies used ML techniques for various security tasks and how they got good results, backed up with numbers and such.

VPN 189
article thumbnail

Abusing cloud services to fly under the radar

Fox IT

Throughout we use terminology to describe the various phases, tactics, and techniques of the intrusions standardized by MITRE with their ATT&CK framework. Near the end of this article all the tactics and techniques used by the adversary are listed with links to the MITRE website with more information. Lateral tool transfer (T1570).

VPN 68
article thumbnail

RSA 2022 Musings: The Past and The Future of Security

Security Boulevard

An anti-DDoS vendor promised “better zero trust visibility.” spotted “forensics as code”, “cloud governance as code”, “detection as code” and a few others. I’ve seen decent examples of how companies used ML techniques for various security tasks and how they got good results, backed up with numbers and such.

VPN 116
article thumbnail

SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store

Fox IT

Authors: Alberto Segura, Malware analyst Rolf Govers, Malware analyst & Forensic IT Expert. After discovery NCC Group immediately notified Google and decided to share our knowledge via this blog post. As far as we observed, this technique is an advanced attack technique which isn’t used regularly within Android malware.

Banking 81
article thumbnail

IT threat evolution Q2 2022

SecureList

New technique for installing fileless malware. Earlier this year, we discovered a malicious campaign that employed a new technique for installing fileless malware on target machines by injecting a shellcode directly into Windows event logs. You can find more details, including appropriate mitigation steps, in our blog post.

Mobile 78