security research


At the beginning of February 2018, FortiGuard Labs collected an email. The email message contains an order tracking number with a fake hyperlink that downloads a jar malware. After a quick analysis, I was able to determine that it is the jRAT/Adwind malware. [Read More]
by RSS Xiaopeng Zhang  |  Feb 16, 2018  |  Filed in: Security Research
In this blog post, we will get into the details of the implementation of Spectre, the exploit that targets the vulnerbilities found in CPUs built by AMD, ARM, and Intel. We assume you are familiar with the concept of the attack, and you can inspect the Proof of Concept source code provided in the Appendix of the paper linked above. You might also find it easier to read this blog post with the source code side by side. [Read More]
by RSS Axelle Apvrille  |  Jan 17, 2018  |  Filed in: Security Research
Welcome back to our monthly review of some of the most interesting security research publications. [Read More]
by RSS Axelle Aprville  |  Jan 14, 2018  |  Filed in: Security Research
On December 7, 2017 Fortinet officially broke ground on our new threat intelligence and research and development campus located next to our existing facilities in Burnaby, British Columbia, Canada. [Read More]
by RSS Julian Kanarek  |  Dec 08, 2017  |  Filed in: Business and Technology
The entire security arms race between IT professionals and cybercriminals is really about one side constantly trying to outsmart the other. Security isn’t just about tools. It’s also about the intelligence that powers them. Which is why when we started Fortinet 16 years ago we were every bit as committed to developing security intelligence and research solutions that were as innovative as the technology we were developing. [Read More]
by RSS Michael Xie  |  Dec 07, 2017  |  Filed in: Business and Technology, Industry Trends
FortiGuard Labs has been tracking a tax refund phishing scam in Malaysia. Let’s get into the details of how this works. [Read More]
by RSS Nelson Ngu  |  Nov 12, 2017  |  Filed in: Security Research
Recently, we came across some interesting samples in jtd format, which is the file format used by JustSystems Ichitaro. The following is a quick primer for readers who are unfamiliar with the Japanese market. [Read More]
by RSS Minh Tran  |  Nov 09, 2017  |  Filed in: Security Research
Welcome back to our monthly review of some of the most interesting security research publications. [Read More]
by RSS Axelle Apvrille  |  Nov 09, 2017  |  Filed in: Security Research
Welcome back to our monthly review of some of the most interesting security research publications. July was very busy with the annual DEFCON and BlackHat US conferences, but also RMLL, the Worldwide Free Software Meeting held this year in France. Past editions: June 2017 May 2017 April 2017 March 2017 Elie Burzstein et al, How We Created the First SHA-1 collision and what it means for hash security video, DEFCON 25 slides and paper With the nickname "Crypto Girl", I obviously had to listen to this... [Read More]
by RSS Axelle Apvrille  |  Sep 07, 2017  |  Filed in: Security Research
Shamoon Timeline The Shamoon virus, also known as Disttrack, surfaced for the first time back in 2012 targeting Middle East Oil companies. It leveraged stolen credentials to gain access, and then exhibited worm-like behavior to spread throughout the entire targeted network. All Shamoon attacks were clearly very carefully planned beforehand, as the attackers had to gain access to legitimate credentials before launching the attack. While most modern malware are focused on monetizing through any way possible, from bitcoin mining to the current... [Read More]
by RSS Douglas Jose Pereira dos Santos, Artem Semenchenko  |  Dec 07, 2016  |  Filed in: Security Research