Remove tag advertisement
article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Today I want to share a quick analysis on a new leaked APT34 Tool in order to track similarities between APT34 public available toolsets. The attacker used an old version of Microsoft.Exchange.WebService.dll tagged as 15.0.0.0 I am a computer security scientist with an intensive hacking background. Michael Lortz.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

For this reason I believe it would be interesting to understand how MBR works and how is it possible to write a boot loader program, this skill will help you during the analysis of your next Boot Loader Malware. When you press the power button you are providing the right power to every electronic chips who needs it. code16 2] .global

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

The analysis of a malicious email revealed a possible raising interest of the TA505 cybercrime gang in system integrator companies. The domain was protected by a Panama company to hide its real registrant and this condition rang a warning bell on the suspected email so that it required a manual analysis in order to investigate its attachment.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

For this reason I believe it would be interesting to understand how MBR works and how is it possible to write a boot loader program, this skill will help you during the analysis of your next Boot Loader Malware. When you press the power button you are providing the right power to every electronic chips who needs it. fill 510-(.-init),