Remove 02
Remove 2015 Remove Blog Remove Encryption Remove Events Remove Security
article thumbnail

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Security Affairs

This is part of a giant list of Living off the Land (LOL) techniques that attackers employ to mask their activities from runtime endpoint security monitoring tools such as AVs. File name: patent-2019-02-20T093A283A05-1.xls The macro makes several string concatenations and executes via a pivot msiexec.exe process. Technical Analysis.

article thumbnail

The Muncy malware is on the rise

Security Affairs

com> This technique is not novel and many web servers available online don’t have the right security configurations to prevent attacks this line. An encrypted snippet of code, for instance, has high entropy associated. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pay attention.