Remove Computer and Electronics Remove File names Remove Groups Remove IT
article thumbnail

Cyber Threats Observatory Gets Improvements

Security Affairs

Based on the magic file bytes this graph would track the percentages of file types that Malware used as carrier. In other words, it could be nice to see what are the patterns used by malware in both: domain names, file names and process names. TOP domains, TOP processes and TOP File Names.

article thumbnail

APT34: Glimpse project

Security Affairs

Indeed we might observe a File-based command and control (a quite unusual solution) structure, a VBS launcher, a PowerShell Payload and a covert channel over DNS engine. Context: Since at least 2014, an Iranian threat group tracked by FireEye as APT34 has conducted reconnaissance aligned with the strategic interests of Iran.

article thumbnail

Hacking The Hacker. Stopping a big botnet targeting USA, Canada and Italy

Security Affairs

I will not disclose the found Malware code nor the Malware Command and Control code nor details on attacker’s group since I won’t put on future attackers new Malware source code ready to be used. My entire “Cyber adventure” began with a simple email within a.ZIP file named “Nuovo Documento1.zip”