article thumbnail

YTStealer info-stealing malware targets YouTube content creators

Security Affairs

To control the browser, the malware uses a library called Rod. The malware encrypts all the data with a key that is unique for each sample and sends it along with a sample identifier to the C2 server located at the domain name youbot[.]solutions. Aparat is an Iranian video-sharing site that was founded in 2011.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This file is encrypted with a hardcoded [XOR encryption] function. This encryption is used to escape the signatures that detect the code that Gooligan borrows from previous malware. Encrypting malicious payload is a very old malware trick that has been used by. since at least 2011. back in 2011.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This file is encrypted with a hardcoded [XOR encryption] function. This encryption is used to escape the signatures that detect the code that Gooligan borrows from previous malware. Encrypting malicious payload is a very old malware trick that has been used by. since at least 2011. back in 2011.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

In the very quiet science fiction section of the Glen Park Public Library in San Francisco. It's a process of protecting critical information through encryption and being aware of the potential for eavesdropping on conversations. In 2011, there a was user in a chat room by the name of altoid, like the mint. And he had.

Privacy 52
article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

As I produce this episode, there's a dangerous new vulnerability known informally as Log4Shell, it’s a flaw in an open source Java logging library developed by the Apache Foundation and, in the hands of a malicious actor, could allow for remote code injection. The other thing I'll tell you is, I joined Codenomicon in 2011.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

The Sleuth Kit enables administrators to analyze file system data via a library of command-line tools for investing disk images. Be it advanced locks, encryption barriers, or deleted and unknown content, the UFED (Universal Forensic Extraction Device) can extract physical and logical data. Magnet Forensics.

article thumbnail

The History of Malware: A Primer on the Evolution of Cyber Threats

IBM Big Data Hub

In the case of double-extortion ransomware attacks, malware is used to not only encrypt the victim’s data but also exfiltrate sensitive files, such as customer information, which attackers then threaten to release publicly. Despite its impact, the cybercriminals behind Mydoom have never been caught or even identified.