Quantcast
Channel: Malwarebytes Unpacked » Joshua Cannell
Browsing latest articles
Browse All 81 View Live

Chameleon WiFi Virus Spreads Like a Cold

A team of researchers at the University of Liverpool developed a virus dubbed Chameleon that travels over WiFi networks and spreads “as efficiently as the common cold spreads between humans.” Unlike...

View Article



Image may be NSFW.
Clik here to view.

Malware with Packer Deception Techniques

As we’ve discussed on our blog several times, malware will make use of commercially available or “homebrewed” packers or cryptors to conceal its malicious code. While there are many programs available...

View Article

Image may be NSFW.
Clik here to view.

Cyber-criminals Use Cancer to Deliver Malware

Well, not literally, although that would make a frightening read. Nonetheless, the folks at Softpedia reported on a spam campaign instilling fears of cancer to users via email. The email features the...

View Article

Image may be NSFW.
Clik here to view.

Bitcoin Malware Found in Leaked Mt.Gox Files

At one time, the Japan-based Bitcoin exchange Mt. Gox handled 70 percent of all Bitcoin transactions. However, you’ve now likely heard the company has fallen into bankruptcy since losing over $400...

View Article

Image may be NSFW.
Clik here to view.

Research Paper Shows Upgrading Android Could Upgrade Malware

Researchers at Indiana University Bloomington and Microsoft released a paper detailing a new set of vulnerabilities in the Android Operating System dubbed Pileup flaws; where Pileup means “privilege...

View Article


Image may be NSFW.
Clik here to view.

“No War on Syria” Spam Used To Harvest Emails

It appears that spammers never waste an opportunity, not even with the Syrian Civil War. During its course, there have been many legitimate petitions against any US involvement in the war. Recently,...

View Article

Image may be NSFW.
Clik here to view.

Sality Malware Now Features DNS Changer

The Sality Malware family has been around since 2003 and has undergone many changes since that time. However, the malware’s latest component might be one of the most interesting to date. Discovered by...

View Article

Image may be NSFW.
Clik here to view.

Beware of Fake UPS Exception E-mails

A spam email claiming to be from UPS is making the rounds. As seen in the image above, the e-mail states that a delivery attempt was made and provides a tracking number. The tracking number is real,...

View Article


Automating Malware Analysis with Cuckoo Sandbox

Analyzing malware can be a lengthy process. Malware today can be simple, like something that downloads another program from a rogue server, or complicated, perhaps utilizing advanced encryption or...

View Article


Image may be NSFW.
Clik here to view.

Five PE Analysis Tools Worth Looking At

In the world of malware analysis, having the right tools can make all the difference. When looking at malicious binaries, they are often in the Windows Portable Executable (PE) format. For this reason,...

View Article

Image may be NSFW.
Clik here to view.

Misleading eBook Advertisements Install PUPs

Regardless of what it is, the Internet is filled with misleading advertisements. Most of you reading this can relate to being in a frustrating situation where you’re looking for the “real” download...

View Article

Image may be NSFW.
Clik here to view.

Fake Evernote Extension Serves Advertisements

Recently a Malwarebytes researcher informed me of a Multiplug PUP that installs a fake Evernote browser extension. Fellow researchers can find the link to this sample on VirusTotal here. A quick look...

View Article

Image may be NSFW.
Clik here to view.

Five Anti-Analysis Tricks That Sometimes Fool Analysts

No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis. Along with visualization technology like VMware, debuggers are also targeted by malware. This...

View Article


Image may be NSFW.
Clik here to view.

The Password and You

Everyone who uses a computer knows the importance of passwords. In several ways, these small textual nuggets have become the keys to much of our lives, if not all our digital lives. But even if you...

View Article

Image may be NSFW.
Clik here to view.

Xtube Exploit led to Cryptowall Malware

We wrote about the adult site xtube.com being compromised, redirecting visitors to a landing page for the Neutrino Exploit kit last week on the Malwarebytes Unpacked blog, The malware that dropped from...

View Article


Image may be NSFW.
Clik here to view.

What’s important about Rombertik?

A few days ago the Talos Research Group, which supports Cisco by creating threat intelligence, released a blog about a piece of malware known as Rombertik, which has gained a lot of attention mainly...

View Article

Image may be NSFW.
Clik here to view.

“WinYahoo” PUP Modifies Chrome Secure Preferences

Potentially Unwanted Programs (PUPs) continue to plague consumers with annoying software that interferes with everyday computer use. This kind of software bloats a filesystem, fills up memory with...

View Article


Image may be NSFW.
Clik here to view.

Beware of GTA 5 Mods Containing Malware

Yesterday, a reddit user posted about mods for GTA 5 containing malware. The affected mods were identified as No-Clip and Angry Planes.   This conversation was started as a result of a thread on the...

View Article

Image may be NSFW.
Clik here to view.

The Logjam Attack: What You Need to Know

A group of security researchers and computer scientists have recently uncovered a vulnerability in how a Diffie-Hellman key exchange is deployed on the web. Dubbed as Logjam, the vulnerability affects...

View Article

Image may be NSFW.
Clik here to view.

Automatic Analysis Using Malheur And Cuckoo

Oftentimes when performing automated analysis of malware we seek to answer one basic question: what kind of malware is it? Automated analysis has become very popular with malware analysts since the...

View Article
Browsing latest articles
Browse All 81 View Live




Latest Images