Home Tags Byte

Tag: Byte

Hackers jailbreak permanent mods onto Super Mario World save files

Incredible hack perpetually alters game through nothing but controller input.

Dridex: A History of Evolution

In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnetrsquo;s activity.

The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a steady revenue stream.

“Yahoobleed” flaw leaked private e-mail attachments and credentials

Yahoo promptly retired ImageMagic library after failing to install 2-year-old patch.

Yahoo retires ImageMagick library after 18-byte exploit leaks user email content

The simple line of code made it possible for attackers to view private Yahoo Mail images.

Yahoo! retires! bleeding! ImageMagick! to! kill! 0-day! vulnerability!

Purple Palace pays researcher US$778 bounty per byte How would you like US$778 per byte for your exploit?…

You only need 60 bytes to hose Linux’s rpcbind

Sigh ... people just leave it on without blocking the port world+dog knows it uses.
So patch it or close it, people A 60 byte payload sent to a UDP socket to the rpcbind service can crash its host by filling up the target's memory.…

Use of DNS Tunneling for C&C Communications

Often, virus writers don't even bother to run encryption or mask their communications. However, you do get the occasional off-the-wall approaches that don't fall into either of the categories.

Take, for instance, the case of a Trojan that Kaspersky Lab researchers discovered in mid-March and which establishes a DNS tunnel for communication with the C&C server.

XPan, I am your father

While we have previously written on the now infamous XPan ransomware family, some of it’s variants are still affecting users primarily located in Brazil.

This sample is what could be considered as the “father” of other XPan ransomware variants.

A considerable amount of indicators within the source code depict the early origins of this sample.

Old Malware Tricks To Bypass Detection in the Age of Big...

Kaspersky Lab has been tracking a targeted attack actor’s activities in Japan and South Korea recently.

This attacker has been using the XXMM malware toolkit, which was named after an original project path revealed through a pdb string inside the… Read Full Article

Unraveling the Lamberts Toolkit

The Lamberts is a family of sophisticated attack tools that has been used by one or multiple threat actors against high-profile victims since at least 2008.

The arsenal includes network-driven backdoors, several generations of modular backdoors, harvesting tools, and wipers.

Android switches to native Java 8 support

Android's mobile application build system will natively support Java 8 features going forward, with Google deprecating the Jack toolchain.Jack has served as a toolchain to compile Java source code into Android dex byte code, with Java providing the ...

PetrWrap: the new Petya-based ransomware used in targeted attacks

This year we found a new family of ransomware used in targeted attacks against organizations.

After penetrating an organization's network the threat actors used the PsExec tool to install ransomware on all endpoints and servers in the organization.

The next interesting fact about this ransomware is that the threat actors decided to use the well-known Petya ransomware to encrypt user data.