Exploit This

Security News, Exploits, and Vulnerabilities.

The Chronicles of the Hellsing APT: the Empire Strikes Back

One of the most active APT groups in Asia, and especially around the South China Sea area is “Naikon”. Naikon plays a key part in our story, but the focus of this report is on another threat actor entirely; one who came to our attention when they hit back at a Naikon attack.

The Banking Trojan Emotet: Detailed Analysis

The Emotet Trojan is a highly automated and developing, territorially-targeted bank threat. Its small size, the dispersal methods used and the modular architecture, all make Emotet a very effective weapon for the cyber-criminal.

IoT Research – Smartbands

One of the big trends in sphere of health and fitness are fitness trackers such as smartbands. Tracking devices and their mobile applications from three leading vendors were inspected in this report to shed some light on the current state of security and privacy of wearable fitness trackers.

‘Locked Out’

In this article we look at the evolution of complication of the encryption schemes used by virus writers and the methods they adopt to put pressure on their victims. At the end of the article there is some advice for users which might help them protect important files.

SMS Trojan bypasses CAPTCHA

Trojan-SMS.AndroidOS.Podec proved to be remarkable: it can send messages to premium-rate numbers employing tools that bypass the Advice of Charge system. It can also subscribe users to premium-rate services while bypassing CAPTCHA.

Threats to Children Online: The Danger is Real

Children today are often far more active Internet users than their parents. Is it safe enough for children to use without fear of facing inappropriate content? To find out we decided to investigate potential online threats to children.

The Enemy on your Phone

A modern smartphone is a full-blown working tool, an entertainment center and a tool to manage your personal finances. The more it can do, the more attractive it is to cybercriminals. The evidence for this is clear when we look at the rapid growth in the numbers of mobile Trojans.

Financial cyber threats in 2014: things changed

In 2013 we registered a sudden surge in the number of attacks targeting users’ financial information and money. In 2014, the situation changed considerably: the number of attacks and attacked users significantly decreased, as did the amount of financial phishing.

DKIM technology on guard of your mail

Over the last decade DKIM signatures have become an important technology in the extensive list of methods for fighting against spam. In this article we investigate the structure of DKIM, reveal the main advantages and downsides of this technology and explore typical spammers’ tricks for forging DKIM signatures.

%d bloggers like this: