Monitoring network traffic is one of the meansĀ for IT administrators to determine if there is an ongoing targeted attack in the network. Ā Remote access tools or RATs, commonly seen in targeted attack campaigns, are employed to establish command-and-control (C&C) communications.Ā Although the network traffic of these RATs, such as Gh0st, PoisonIvy, Hupigon, and PlugX, among…
Read MoreThreats like UPATRE are continuously evolving as seen in the development of the techniques used so as to bypass security solutions. UPATRE malware are known downloaders of information stealers likeĀ ZeuS that typically spread via email attachments. We recently spotted several spam runs that use the popularĀ file hosting service Dropbox. These use embedded links lead to…
Read MoreWe recently discovered malicious Microsoft Software Installation (MSI) files that download and execute other files, and could bypass traditional security solutions. Malicious actors can abuse custom actions in these files to execute malicious scripts and drop malware that are either capable of initiating a system shutdown or targeting financial systems located in certain locations.
Read MoreBy employing machine learning algorithms, we were able to discover an enormous certificate signing abuse by BrowseFox, a potentially unwanted application (PUA) detected by Trend Micro as PUA_BROWSEFOX.SMC. BrowseFox is a marketing adware plugin that illicitly injects pop-up ads and discount deals. While it uses a legitimate software process, the adware plugin may be exploited…
Read MoreThe OSX_DOK malware showcases sophisticated features such as certificate abuse and security software evasion that affects machines using Appleās OS X operating system. This malware, which specifically targets Swiss banking users, uses a phishing campaign to drop its payload, which eventually results in the hijacking of a userās network traffic using a Man-in-the- Middle (MitM) attack. OSX_DOK seems to be another version of WERDLOD, which is a malware that was used during the Operation Emmental campaigns.
Read More