Our previous analysis of the Flame malware, the advanced cyber-espionage tool that’s linked to the Stuxnet operation, was initially published at the end of May 2012 and revealed a large scale campaign targeting several countries in the Middle East. The Flame malware, including all of its components, was very large and our ongoing investigation revealed […]
Archive for the ‘Security News’ Category
Full Analysis of Flame’s Command & Control servers


Full Analysis of Flame’s Command & Control servers


Our previous analysis of the Flame malware, the advanced cyber-espionage tool that’s linked to the Stuxnet operation, was initially published at the end of May 2012 and revealed a large scale campaign targeting several countries in the Middle East. The Flame malware, including all of its components, was very large and our ongoing investigation revealed […]
Vidro: How deep and mobile is the rabbit hole?


The appearance of a new Android malware family is not that surprising at all today. Especially when we talk about SMS Trojans which are one of the most popular and oldest type of threats created for extracting money from users. A new family of SMS Trojans named Vidro appeared a few days ago but weve […]
“RunForestRun”, “gootkit” and random domain name generation


Recently, we came across web malware that instead of injecting an iframe pointing to a fixed existing address generates a pseudo-random domain name, depending on the current date. This approach is not new and is widely used by botnets in CC domain name generation, yet it’s not very common for the web malware weve seen […]
Defcon is 20 Years Old in 2012


Defcon 2012 marked its 20th anniversary with unexpected speakers, some pretty tough content, and the cultural dark magic that buzzes the conference every year. The Dark Tangent welcomed Mark Weatherford. an ex-Navy and Raytheon security guy that became the CISO of the State of Colorado and California and then CSO at the highly regulated NERC […]
Blackhat USA 2012


The Blackhat 2012 keynote started the event with Shawn Henry, and ex-Fbi director, painting a grim, seemingly unspeakable picture of cyberespionage in the US. It was interesting that he continually spoke about the gravity of the situation and the need to apply what he learned at the Fbi to protecting digital assets, but he couldn’t […]
Blackhat USA 2012


The Blackhat 2012 keynote started the event with Shawn Henry, and ex-Fbi director, painting a grim, seemingly unspeakable picture of cyberespionage in the US. It was interesting that he continually spoke about the gravity of the situation and the need to apply what he learned at the Fbi to protecting digital assets, but he couldn’t […]
Looking back at BlackHat


BlackHat USA may have been wrapped up for the year but DEFCON is in full swing. I didn’t stay around for DEFCON though, which means I finally have some time to reflect on BlackHat. This year featured the first time Apple presented at BlackHat, about iOS security. While the presentation lacked the details usually seen […]
Looking back at BlackHat


BlackHat USA may have been wrapped up for the year but DEFCON is in full swing. I didn’t stay around for DEFCON though, which means I finally have some time to reflect on BlackHat. This year featured the first time Apple presented at BlackHat, about iOS security. While the presentation lacked the details usually seen […]
New malware for Mac: Backdoor.OSX.Morcut


Yesterday lots of antivirus labs got a sample of the new antivirus program targeting MAC OS X users. This sample named Backdoor.OSX.Morcut was distributed using social engineering techniques via a JAR file with the name AdobeFlashPlayer.jar and allegedly signed by VeriSign Inc. Notification from the JAVA virtual machine about the launch of the untrusted applet […]
The Madi Campaign


In our previous blogpost, we discussed the Madi campaign, uncovered through joint research with our partner Seculert. In this blogpost, we will continue our analysis with information on the Madi infrastructure, communications, data collection, and victims. The Madi infrastructure performs its surveillance operations and communications with a simple implementation as well. Five command and control […]
Madi is back


Last night, we received a new version of the #Madi malware, which we previously covered in our blog. Following the shutdown of the Madi command and control domains last week, we thought the operation is now dead. Looks like we were wrong. The new version appears to have been compiled on July 25th as it […]
The Madi Campaign


For almost a year, an ongoing campaign to infiltrate computer systems throughout the Middle East has targeted individuals across Iran, Israel, Afghanistan and others scattered across the globe. Together with our partner, Seculert, weve thoroughly investigated this operation and named it the Madi, based on certain strings and handles used by the attackers. You can […]
Wenlock, Mandeville and you *


There are just 11 days to go until the opening ceremony of the Summer Olympic Games in London. With the games fast approaching, now’s a good time for us to issue a gentle reminder about security. I’m not thinking here about the security of the games themselves. It’s possible, of course, that someone might try […]
How to survive attacks that result in password leaks?


We speak about attacks on online providers that result in the leak of personal users’ passwords. Just recently we saw the leak of 6.46 million Linkedin user passwordss. Right after this we saw a leak of 400 thousand Yahoo Voices passwords. These are not isolated cases; nowadays we see many successful attacks that lead to […]
Patch Tuesday July 2012


This month’s patch Tuesday brings a set of three “critical” bulletins focused on Windows/web browser component vulnerabilities and six other bulletins rated “important”. In other words, two of the critical components are considered “Windows” components, but most likely would be attacked through the web browser. Also, the top priority bulletin patches the CVE-2012-1889 vulnerability being […]
Is it the end of the DNSChanger Trojan?


Not really, especially in Latin America. Every day we register lots of similar attacks, each abusing local DNS settings. Actually these attacks are a bit different because they modify the local HOST file but the principle is the same – redirecting the victim to a malicious host via malicious DNS records. Latin American cybercriminals are […]
DNSChanger


Here we are. It’s the last call on DNSChanger cleanup. On Monday, the Fbi-run replacement DNS servers are coming down because the court-ordered extension is coming to an end, and your systems may using these servers for resolution. There are a set of sites that may unreliably help you identify whether your machine or router […]
The end of DNS-Changer


FBI’s “Operation Ghost Click” was discussed earlier by my colleague Kurt here and here and now it comes to an end. Next Monday, 9th of July, at 06:00 (MEZ) the temporary DNS-servers setup by FBI will be shut down. But still there are still thousands of infected machines – one can wonder, what will happen […]
Find and Call: Leak and Spam


Yesterday we were contacted by our partner MegaFon, one of the major mobile carriers in Russia. They notified us about a suspicious application, which was found in both the Apple App Store and Google Play. At first glance, this seemed to be an SMS worm spread via sending short messages to all contacts stored in […]