Remove tag data-localization
article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

During the analysis time, only really few Antivirus (6 out of 60) were able to “detect” the sample. The Sample (SHA256: e5c67daef2226a9e042837f6fad5b338d730e7d241ae0786d091895b2a1b8681) presents itself as a JAR file. AntiVirus Coverage. Python Script to Decode AES-KEY. Resource (a.k.a Byte to be decrypted. Secret Key.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Smart Meters provide the data to support a cleaner future, showing how much energy is being used and how much this will cost you. So nothing to do with electronics whatsoever other than we sell, you know, technology products, right, and cameras and things like that. I logged all that data. Hask This is a map of Dallas, Texas.