Remote Access Trojan KONNI Targeting North Korea Technical Analysis and Solution

August 18, 2017 | wangyang2

This July a remote access trojan (RAT) KONNI was discovered to be involved in a cyberattack targeting North Korea, which was presumably linked to South Korea. This RAT spreads mainly through phishing emails. Specifically, the attacker first tries to have a powershell script executed via an .scr file, and then downloads the malware of an […]

Dumbo Exploit Project

August 4, 2017 | Adeline Zhang

Overview This week WikiLeaks published a document outlining another leaked hacking tool developed by the CIA (Central Intelligence Agency). The exploit titled ‘Dumbo’ possesses the capability of remotely managing and altering video and audio recordings on Windows XP systems.  At the moment, the malware is only able to successfully run on 32-bit Windows XP, Vista, […]

Threat Actor – APT28

June 8, 2017 | Adeline Zhang

Overview APT28 is a recognized state-sponsored threat actor operating out of Russia. Nefarious efforts and known exploits conducted by ATP28 (Advanced Persistent Threat) have been tracked as early as 2007 by various cyber-security experts in the field. The following information will outline the worldwide cyber warfare attacks that have been linked to APT28 throughout their […]

Blackmoon Banking Trojan Overview

June 2, 2017 | Adeline Zhang

Overview The Blackmoon Bank Trojan that was originally identified in 2016 has since re-surfaced. Recently, more than 150,000 bank accounts were compromised in South Korea and the Blackmoon Trojan has been identified as the culprit. A new 2017 version has hit the financial industry and employs a new framework model primarily targeting the online banking […]

Retrospective: NHS, ransomware and technical debt

May 31, 2017 | NSFOCUS

By: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS On May 15th, the NHS (UK’s National Health Service) suffered its single worst disruption to service in the history of the organisation. The disruption was due to a type of malicious software, known as ransomware, with the purpose of attempting to extort money from victims by encrypting their […]

Solving the DDoS Problem – One Summit at a Time

April 8, 2017 | Adeline Zhang

By: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS It’s no secret that DDoS attacks are on the rise. Statistic-after-statistic, report-after-report, all say the same thing about DDoS. However, who are the companies that have perfected the technology, tactics, techniques, and procedures used in front-lines to defeat DDoS attacks every day? NSFOCUS is one such company that […]

Swearing Trojan Exploit Overview

April 3, 2017 | Adeline Zhang

Author: Cody Mercer – Senior Threat Intelligence Researcher Executive Overview A new mobile banking Trojan titled ‘Swearing Trojan’ has been discovered by Tencent Security and Checkpoint researchers. The odd name of the malware is in part attributed to the various Chinese swear words sparsely distributed in the source code. The primary attributes associated with the […]

NSFOCUS Wins Big at European IT and Software Excellence Awards 2017

March 31, 2017 | NSFOCUS

Intelligent Hybrid DDoS defence provider claims Top prize for Security Solution of the Year London, UK – 31 March 2017 – NSFOCUS, the intelligent hybrid DDoS defence provider, has been awarded the Security Solution of the Year at the European IT & Software Awards 2017 (www.iteawards.com) – the leading pan-European awards for ISVs, Solution Providers […]

Dridex – v4

March 23, 2017 | Adeline Zhang

Author: Cody Mercer – Senior Threat Intelligence Research Analyst Executive Overview A newly discovered modified version of Dridex, now termed ‘Dridex v4’, has been recognized in the wild in recent days. The upgraded version of the Dridex Trojan was at one time one of the most successful bank Trojans originally discovered in 2014 and has […]

Dahua Cameras Unauthorized Access Vulnerability Analysis & Solution

March 17, 2017 | Adeline Zhang

Overview Dahua Technology, a well-known security camera and digital video recorder (DVR) vendor in China, released firmware updates to address serious security vulnerabilities for several of their products. By exploiting this vulnerability an attacker can access the user database of a Dahua camera without needing administrative privileges and extract the user name and password hash. […]

Search

Subscribe to the NSFOCUS Blog