Remove 2014 Remove Analysis Remove Libraries Remove Manufacturing
article thumbnail

Devices from Dell, HP, and Lenovo used outdated OpenSSL versions

Security Affairs

Researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. Binarly researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. ” continues the report. that dates back to 2009.

Libraries 100
article thumbnail

EventBot, a new Android mobile targets financial institutions across Europe

Security Affairs

” reads the analysis published by Cybereason. Most recent versions of EventBot also include a ChaCha20 library that can improve performance, but it is not currently being used, a circumstance that suggests authors are actively working to optimize EventBot. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OceanLotus APT group leverages a steganography-based loader to deliver backdoors

Security Affairs

Since at least 2014, experts at FireEye have observed APT32 targeting foreign corporations with an interest in Vietnam’s manufacturing, consumer products, and hospitality sectors. To make hard the analysis of the malware, backdoor DLLs are heavily obfuscated and C2 communication encrypted. Pierluigi Paganini.

article thumbnail

New Cyber Operation Targets Italy: Digging Into the Netwire Attack Chain

Security Affairs

The particular chain of attack we discovered showed interesting technical patterns resembling other previous activities targeting the Italian manufacturing landscape, for this reason, we decided to dig deeper. Technical Analysis. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Code Snippet 4.

article thumbnail

After 2 years under the radars, Ratsnif emerges in OceanLotus ops

Security Affairs

Since at least 2014, experts at FireEye have observed APT32 targeting foreign corporations with an interest in Vietnam’s manufacturing, consumer products, and hospitality sectors. ” reads the analysis published by Cylance. ” continues the analysis. of the wolfSSL library , formerly known as CyaSSL.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. Play store app manipulation The final step of the infection is the injection of a shared library into the Play store app. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. Play store app manipulation The final step of the infection is the injection of a shared library into the Play store app. first post. recounts Gooligan’s origin story and provides an overview of how it works.