Malicious Streams

Species Analysis

Low Tech Ransomware

Recently, I had the opportunity to analyze a new ransomware Trojan.  What I found was an interesting sample that relied more on social engineering than on advanced tech to extort money from the end user.  Read More

PDF Malware Overview

As far back as 2001 (Peachy Worm) we have seen cyber criminals utilize embedded malicious scripts and other dynamic PDF features to install malware and steal user credentials. While the goals and technical payloads of these PDFs have changed over the years, the pattern for creating a malicious PDF remains largely unchanged.

[Report posted as part of the SANS Malware FAQ: Read Report ]

PDF Malware: Pidief

PDF viewers can be found (and normally pre-installed) on all major computing and mobile platforms making it the most popular document format available today. Without surprise this popularity and adoption has gained the attention of malware authors.

[Report posted as part of the SANS Malware FAQ: Read Report ]

Malicious Social Networking: Koobface Worm

The popularity of social networking sites such as MySpace and Facebook has sky rocketed in recent years. Today nearly everyone has a profile and established friends lists that are used to keep tabs on your two hundred closest friends. For most, the motive behind these sites lies somewhere between a genuine interest in keeping in touch with friends and family to keeping up with the latest gossip. This popularity hasn't gone unnoticed to the malcode authors. To these authors, social engineering is a key tactic used to get their wares installed on unsuspecting victims. Social networking sites makes socially engineering victims almost too easy.

[Report posted as part of the SANS Malware FAQ:
Read Report ]

OS X Tored.A: Lameware

This new OS X “Worm” is one poorly written piece of malware. Written in RealBasic the malware utilizes no encryption, no packing technology, and most of the time just doesn’t work. It was quite amusing reading the embedded strings -- I will spare you the profanity. One thing that did catch my eye was all the hard coded SMTP servers the “worm” utilizes were in France. So I decided to plot the SMTP servers using whois/google maps ...



So where do you think our vxer is from?

OS X Puper.A (RS-Plug.F)

OS X Puper.A by most accounts has been the most popular Mac OS X malware in the past 18 months. What is most fascinating is how little sophistication is involved in this threat and yet how it continues to be a viable threat for the Mac platform. Read the analysis report for details. Read Report

Fujacks: A Modern File Infector

Fujacks was an interesting malware species that helped re-introduced the file infector behavioral into today’s blended threat. This analysis report focuses on the reproductive behavioral of this modern file infector. Read Report