Reflection on Detection of Encrypted Malware Traffic

The Internet has become an indispensable part of our lives, and it is of vital importance to work out how to guarantee the security of users' sensitive information and privacy in cyberspace. Most of the Internet traffic is encrypted with Transport Layer Security (TLS), which cannot guarantee absolute security. Malware...

Analysis of the SBIDIOT IoT Malware

Produced by: Yuchen PAN Introduction Recently, an IoT malware sample dubbed SBIDIOT is found to engage in malicious activities, mainly distributed denial of service (DDoS) attacks. So far, very few incidents of this malware have been discovered by VirusTotal and cybersecurity communities. Though some IoT botnets focus on cryptocurrency mining...

‘FreakOut’ Malware Analysis – FreakOut Samples

Produced by: NSFOCUS Security Labs FreakOut samples appearing in the campaign were a typical IRC bot Trojan program written in Python. The Trojan program would connect to IRC channels in hardcoded C&C and act as instructed by C&C to collect information, launch DDoS attacks, interact with shells, and conduct ARP...

‘FreakOut’ Malware Analysis – Groups Behind FreakOut

Produced by: NSFOCUS Security Labs In early January 2021, NSFOCUS Security Labs captured an unknown malicious program called "out.py" via its real-time data platform, which is usually spread with the domain name "gxbrowser.net". NSFOCUS Security Labs conducted an in-depth research on the samples and payloads of the malware and compared...

Technical Analysis Report on Rowdy, A New Type of IoT Malware Exploiting STBs

In August 2017, NSFOCUS's DDoS situation awareness platform detected anoma-lous bandwidth usage over a customer's network, which, upon analysis, was confirmed to be a distributed denial-of-service (DDoS) attack. The attack was characterized by different types of traffic, including TCP flood, HTTP flood, and DNS flood. Tracing source IP addresses, we...

DDoS attacks – more than just disruption?

Track:  General Security Author: Vann Abernethy, Field CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have been increasing in popularity due to the relative ease in carrying one out.  Traditionally, the purpose of these attacks has been to make a site or service unavailable to its intended...

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.