zeus banking trojan


Last week, an unidentified malware (with SHA-256 171693ab13668c6004a1e08b83c9877a55f150aaa6d8a624c3f8ffc712b22f0b) was discovered and circulated on Twitter by researcher @JAMES_MHT. Many researchers - including us - were unable to identify the malware so we decided to dig a bit further. In this post, we will share our findings about this malware: its targets, technical analysis, the related attacks and the threat actor behind it. Targets One of the first things we wanted to know is if this malware has a specific target--thanks to researcher... [Read More]
by RSS Floser Bacurio and Roland Dela Paz  |  Jun 21, 2016  |  Filed in: Security Research
Since the dawn of the personal computer, the words “teenage” and “hacker” have often been inextricably linked. And classic films such as "Hackers," "Sneakers" and "Wargames," –not to mention one of the greatest hackers in pop culture Ed from the anime “Cowboy Bebop”-- about young hackers who find themselves in precarious situations involving government and espionage operations, serve to reinforce images of brilliant, misunderstood youth who in the end use their computer acumen to fight the bad guys and save the day. But, as... [Read More]
by RSS Stefanie Hoffman  |  May 23, 2012  |  Filed in: Industry Trends