Remove tag national-institute-of-standards-and-technology
article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

This strategy is especially important against nations it sees as a threat to its regional power such as Saudi Arabia and the United Arab Emirates.” APT 34, also referred to as “ OilRig ” or Helix Kitten , has been known to target regional corporations and industries. APT34 conducts cyber espionage on behalf of Iran. Michael Lortz.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

When you press the power button you are providing the right power to every electronic chips who needs it. Marco Ramilli explained MBR works and how is it possible to write a bootloader program, this skill will help you to analyze next BootLoader Malware. How the PC boot process works ? Actually the boot process is super easy. Used tools.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

Today I’d like to share the following reverse engineering path since it ended up to be more complex respect what I thought. The full path took me about hours work and the sample covers many obfuscation steps and implementation languages. Stage1: JAR invoking JavaScript. This is totally interesting stuff :D. Python Script to Decode AES-KEY.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

When you press the power button you are providing the right power to every electronic chips who needs it. Marco Ramilli explained MBR works and how is it possible to write a bootloader program, this skill will help you to analyze next BootLoader Malware. How the PC boot process works ? Actually the boot process is super easy. Used tools.

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

The analysis of a malicious email revealed a possible raising interest of the TA505 cybercrime gang in system integrator companies. Introduction. During a normal monitoring activity, one of the detection tools hits a suspicious email coming from the validtree.com domain. Technical Analysis. Image1: Word Document Content.