Remove analyzing-malicious-documents
article thumbnail

Info stealer attacks target macOS users

Security Affairs

Experts warn of info stealer malware, including Atomic Stealer, targeting Apple macOS users via malicious ads and rogue websites. Jamf Threat Labs researchers analyzed info stealer malware attacks targeting macOS users via malicious ads and rogue websites. The search engine proposed a malicious site aricl[.]net

IT 128
article thumbnail

How Malicious Android Apps Slip Into Disguise

Krebs on Security

Researchers say mobile malware purveyors have been abusing a bug in the Google Android platform that lets them sneak malicious code into mobile apps and evade security scanning tools. “We are investigating possible fixes for developer tools and plan to update our documentation accordingly,” Google’s statement continued. .

IT 192
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

REMnux Tools List for Malware Analysis

Lenny Zeltser

REMnux ® offers a curated collection of free tools for reverse-engineering or otherwise analyzing malicious software. To guide you through the process of examining malware, REMnux documentation lists the installed tools by category.

article thumbnail

FIN7 targeted a large U.S. carmaker phishing attacks

Security Affairs

In the attacks analyzed by BlackBarry, threat actors used a typosquatting technique, they used a malicious URL “advanced-ip-sccanner[.]com” In the attacks analyzed by BlackBarry, threat actors used a typosquatting technique, they used a malicious URL “advanced-ip-sccanner[.]com” com”, which is a free online scanner.

Phishing 112
article thumbnail

Dridex targets MacOS users with a new delivery technique

Security Affairs

Trend Micro experts discovered a new variant of the Dridex banking malware that targets the MacOS platform and that used a new technique to deliver documents embedded with malicious macros. The sample analyzed by Trend Micro arrived in the form of a Mach-o executable file: a.out (detected asTrojan.MacOS.DRIDEX.MANP).

IT 98
article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

As someone who’s helped thousands of security professionals learn how to analyze malware at SANS Institute , I have a few tips for how you can get started. There are several ways to describe the skills you to analyze malicious software. Understand Where You Currently Fit Into the Malware Analysis Process.

Metadata 145
article thumbnail

Deep Learning to Find Malicious Email Attachments

Schneier on Security

It's challenging to tell the difference between legitimate documents in all their infinite variations and those that have specifically been manipulated to conceal something dangerous. Google says that 63 percent of the malicious documents it blocks each day are different than the ones its systems flagged the day before.

Security 121