Remove Computers and Electronics Remove DNS Remove Hacking Remove Penetration Testing
article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Security expert Marco Ramilli has analyzed the recently leaked APT34 hacking tool tracked as Jason – Exchange Mail BF. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

T1094) mainly developed using DNS resolutions (which is actually one of the main characteristic of the attacker group). They begun development by introducing crafted communication protocol over DNS and later they added, to such a layer, encoding and encryption self build protocols. About the author: Marco Ramilli, Founder of Yoroi.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

Building a re-directors or proxy chains is quite useful for attackers in order to evade Intrusion Prevention Systems and/or protections infrastructures based upon IPs or DNS blocks. TA505 hacking group has been active since 2014 focusing on Retail and banking sectors. Image3: Redirecting script. net http[://com-mk84.net.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. Kennedy founded cybersecurity-focused TrustedSec and Binary Defense Systems and co-authored Metasploit: The Penetration Tester’s Guide. — Dave Kennedy (@HackingDave) July 15, 2020.

article thumbnail

APT34: Glimpse project

Security Affairs

Indeed we might observe a File-based command and control (a quite unusual solution) structure, a VBS launcher, a PowerShell Payload and a covert channel over DNS engine. According to Duo, “ OilRig delivered Trojans that use DNS tunneling for command and control in attacks since at least May 2016. It is not a TXT request.

DNS 87
article thumbnail

Iran-linked APT34: Analyzing the webmask project

Security Affairs

Security expert Marco Ramilli published the findings of a quick analysis of the webmask project standing behind the DNS attacks implemented by APT34 (aka OilRig and HelixKitten ). According to Duo, “ OilRig delivered Trojans that use DNS tunneling for command and control in attacks since at least May 2016. Leaked Source code.

DNS 78
article thumbnail

The ‘MartyMcFly’ investigation: Italian naval industry under attack

Security Affairs

DNS requests intercepted. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. I’ve also been encharged of testing uVote voting system from the Italian Minister of homeland security.