Remove 08
Remove 2015 Remove Government Remove Presentation Remove Security
article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

The Sample (SHA256: e5c67daef2226a9e042837f6fad5b338d730e7d241ae0786d091895b2a1b8681) presents itself as a JAR file. reg file to enumerate tons of security tools that have been widely used by analysts to analyze Malware. The attacker enumerates 571 possible analysis tools that should not be present on the target machine (Victim).

article thumbnail

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

The group behind this activity is the same we identified in the past malicious operations described in Roma225 (12/2018), Hagga (08/2019), Mana (09/2019), YAKKA (01/2020). The code contains some “funny” comments related to the twitter community of security researchers which constantly monitor the actor operations.