Remove Computers and Electronics Remove Encryption Remove Malware Remove Penetration Testing
article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

Yoroi security firm uncovered a targeted attack against one of the most important companies in the Italian Naval Industry leveraging MartyMcFly Malware. At a first sight, the office document had an encrypted content available on OleObj.1 And why the attacker used an encrypted payload if the victim cannot open it? 1 and OleObj.2.

Malware 88
article thumbnail

Step By Step Office Dropper Dissection

Security Affairs

Malware researcher and founder of Yoroi Marco Ramill described a step-by-step procedure that shows how to dissect an Office dropper. Both of those tricks are quite well-known in the malware industry. In the first case (HTTP GET) the Malware communicates to server through cookies, using a 6 digit numeric variable.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Frequent VBA Macros used in Office Malware

Security Affairs

The malware expert Marco Ramilli collected a small set of VBA Macros widely re-used to “weaponize” Maldoc (Malware Document) in cyber attacks. Here comes the idea to collect a small set of VBA Macros widely re-used to “weaponize” Maldoc (Malware Document) in contemporary cyber attacks.

Malware 71
article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

The popular malware researchers Marco Ramilli has analyzed a malware that remained under the radar for more than two years. The first thought that you might have as an experienced malware reverse engineer would be: “Ok, another bytecode reversing night, easy. Resource (a.k.a package in where it will be contextualized).

article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

Cybercrime gang behind the Emotet malware is targeting organization with external SOC with emails claiming to deliver a SOC “weekly report.”. The group behind Emotet malware is getting smarter and smarter in the way the y deliver such a Malware. I am a computer security scientist with an intensive hacking background.

article thumbnail

Crimeware and financial cyberthreats in 2023

SecureList

Unlike common stealers, this malware gathered data that can be used to identify the victims, such as browsing histories, social networking account IDs and Wi-Fi networks. In the past, many actors would join forces to attack and encrypt as many organizations around the world as possible. ATM and PoS malware to return with a vengeance.

article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

T1388) , from group_b to group_d time frames OilRig used real Compromised User Accountsextracted by Malware (rif. They begun development by introducing crafted communication protocol over DNS and later they added, to such a layer, encoding and encryption self build protocols. Exploit Technique Over Time.