Remove Computers and Electronics Remove Hacking Remove Malware Remove Penetration Testing
article thumbnail

Security expert Marco Ramilli released for free the Malware Hunter tool

Security Affairs

Malware researcher Marco Ramilli released for free the Malware Hunter tool a simple but interesting catching tool base on static YARA rules. Malware researcher Marco Ramilli released for free the Malware Hunter tool a simple but interesting catching tool base on static YARA rules. Malware Static Analysis.

Malware 91
article thumbnail

Using Microsoft Powerpoint as Malware Dropper

Security Affairs

Marco Ramilli, founder and CEO at cyber security firm Yoroi has explained how to use Microsoft Powerpoint as Malware Dropper. Nowadays Microsoft office documents are often used to propagate Malware acting like dynamic droppers. The final payload looks like AzoRult Malware. Security Affairs – Microsoft Powerpoint, malware).

Malware 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware Training Sets: FollowUP

Security Affairs

The popular expert Marco Ramilli provided a follow up to its Malware classification activity by adding a scripting section which would be useful for several purposes. On 2016 I was working hard to find a way to classify Malware families through artificial intelligence (machine learning).

Malware 70
article thumbnail

Free Tool: Honey Feed

Security Affairs

Early February, Marco Ramilli released for free the Malware Hunter tool a simple but interesting catching tool based on static YARA rules. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

article thumbnail

Sustes Malware: CPU for Monero

Security Affairs

Sustes Malware doesn’t infect victims by itself, but it is spread via brute-force activities with special focus on IoT and Linux servers. Sustes Malware doesn’t infect victims by itself (it’s not a worm) but it is spread over the exploitation and brute-force activities with special focus on IoT and Linux servers.

Malware 93
article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

Yoroi security firm uncovered a targeted attack against one of the most important companies in the Italian Naval Industry leveraging MartyMcFly Malware. Further details on the MartyMcFly malware are reported in the original analysis published by Marco Ramilli on his blog. Security Affairs – MartyMcFly , malware).

Malware 89
article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

Marco Ramilli explained MBR works and how is it possible to write a bootloader program, this skill will help you to analyze next BootLoader Malware. From time to time we might observe special Malware storing themselves into a MBR and run during the booting process. SecurityAffairs – malware, bootloader ). Pierluigi Paganini.