worm


BlueBorne affects devices supporting Bluetooth. As such, the PoC they demoed does not spread over Bluetooth: it takes control of a given Bluetooth victim. Apparently, the researchers said they locally created a botnet. But that was clearly a local inside test, and we have no details regarding the botnet's payload. [Read More]
by RSS Axelle Apvrille  |  Sep 19, 2017  |  Filed in: Security Research
We are currently tracking a new ransomware variant sweeping across the globe known as Petya. It is currently having an impact on a wide range of industries and organizations, including critical infrastructure such as energy, banking, and transportation systems. This is a new generation of ransomware designed to take advantage of timely exploits. This current version is targeting the same vulnerabilities that we exploited during the recent Wannacry attack this past May. This latest attack, known as Petya, is something we are referring to as... [Read More]
by RSS Aamir Lakhani  |  Jun 27, 2017  |  Filed in: Security Research
Valentine’s day is just around the corner and it would not be fair to let the occasion pass us by without reflecting on the colorful, charming, amorous, sometimes exotic world of malware. In this blog we explore some of the milestone threats that have courted many a user over the years, proving only that there are, in fact, other (meaner) fish in the sea. 1971: The Creeper Virus In 1949, the visionary mathematician John von Neumann conceived the idea of self-replicating automata, even before the existence of the modern computer. Little... [Read More]
by RSS Michael Perna  |  Feb 12, 2016  |  Filed in: Industry Trends
[Read More]
by RSS Michael Perna  |  Oct 24, 2014  |  Filed in: Industry Trends
You have one new notification! Most people don't think twice about a message from a friend on instant messenger, a link to a funny video from a work colleague, or a USB drive with the latest family album. Most of us also assume the next best cat meme isn't going to offload our banking passwords to a remote server, hijack our system for DoS attacks, or hide all the files on our desktop. Unfortunately, Dorkbot does all of these things. Fortinet's threat research division, FortiGuard Labs reported a 0.98% increase in activity from Dorkbot just... [Read More]
by RSS Michael Perna  |  Jul 09, 2014  |  Filed in: Industry Trends
Over the past two years, rarely did a worm get as much attention that Conficker (aka Downadup) is getting now. Its last variant, the infamous W32/Conficker.C, which surfaced in early March and is set to time-bomb on April 1, is literally all over the media. Of course, its features are well known and documented and some papers (such as SRI's excellent analysis and a blog post from Sourcefire) even give interesting insights on the reverse engineering process. Indeed, while understanding the behavior of the malware is important to most people, learning... [Read More]
by RSS Rex Plantado  |  Mar 26, 2009  |  Filed in: Security Research