Prism themed ransomware - Kovter evolution
Prism logo ;)I found a new (to me - it seems it's 2 weeks old) Prism Themed ransomware. Not really worth a post but could make you smile too...so here is it :Prism Themed Ransomware -...
View ArticleFinally ! Here is ... GrandSoft Private SploitPack !!
(not the logo - just for Thumbnail)That's a lot of exclamation mark but when you can name something after wondering for months what it was, you want to share the !!!I've heard of GrandSoft and from...
View ArticleRevoyem goes international - shocking distribution....
The dirty Revoyem (aka DirtyDecrypt) ransomware seems to have appeared at the end of March 2013 and was targeting Germany and Great Britain only. It looks like they are now going international and are...
View Articlejre7u21 and earlier Click-2-Play Warning Bypass integrating Exploit Kits
A new variant of a "Kore-ish" Cool EK appeared few days ago.Yes...it's difficult to follow the EK fast moving landscape...No payload in the jar for that one.Some instances of this "Cool EK" in...
View ArticleCookie-Bomb : The "Северная Сказка" Iframer way
For Thumbnail(from turn.com)First mention of what they named "CookieBomb" code injection attack come from @MalwareMustDie in this post.#MalwareMustDie NEW #BLOG: Proof of Concept of "CookieBomb" attack...
View ArticleFlimrans Affiliate : Borracho
In middle of may a new Ransomware appeared (or at least was spotted), pushed in a new Exploit Kit named Flimkit by Chris Wakelin.Flimkit pushing FlimransEncoded Payload in the Jar404 Call back for...
View ArticleLate Disclosure - Darkleech Actors /Home/ - some numbers
To illustrate a post to come on Blackhole Transition here are some numbers for the /home/ aka q.php Blackhole aka Darkleech fuelled.Note : Darkleech module filter user-agent. Infection tried only on IE...
View ArticlePaunch's arrest...The end of an Era !
snipshot of :Spin up of a Supermassive Black Hole Illustration Credit: Robert Hurt, NASA/JPL-CaltechNote: This post is a work in progress. Not all group have transitioned. So I will update (if I am...
View ArticleMeet Madness Pro or Few days rise of a Ddos Botnet
At begining of September I landed on a new instance of Cool Exploit Kit : /paper/Cool EK pushing Dipverdle which then call Home and gatherMadness ( sometimes no analysis needed ;) ) ddos botDipverdle...
View ArticleUrausy is going Regional in United States
As long as there will be people paying...I guess we'll have news to write about Ransomware.Today I faced a new Design for Urausy in United States...Was wondering what was making it new.See :Urausy -...
View ArticleJolly Roger Stealer - Stoberox.B(?)/Zlader.F
Piece of Jolly Roger Stealer AdvertOriginal Text of the Advert------------------------------------------ Jolly Roger Stealer - обновленная система сбора па, Стилер пассов с функционалом лоадераДоброго...
View ArticleKovter becomes even more abominable . Also add new targets.
In Kovter NL DesignKovter is following Revoyem's path.Double shock on victims and new targeted countries.This evolution has been spotted by Rich from MalwarebytesMalware-Ransomers Getting Very Sick....
View ArticleBig Andromeda Campaign back on track. From Sweet Orange to Neutrino
This is not the usual post I write but decided to go on as the campaign is quite big (enough to modify the EK market share feeling) and I have some compromised domain to share for remediation (see at...
View ArticleMagnitude EK : Pop Pop !
MagnitudeMagnitude is a community name choosen for an Exploit Kit previously referred to as "Popads".Why Popads ?Many days after it was first spotted, the driveby was being done using Malvert pushed...
View ArticleCVE-2013-2551 and Exploit Kits
A late post to sum up what has been seen in Exploit Kits regarding that CVE-2013-2551.This vulnerability has been exploited during Pwn2Own 2013 by VUPEN the 2013-03-07First mention was by Yonathan...
View ArticleInside a (The?) Simda Affiliate : Партнёрка Podmena (formerly Chesto)
Simda being distributed in Affiliate mode can be found via many different infection vectors.But it's the only payload of what I call "Styx Kein"First mention of this Styx "instance" I found comes from...
View ArticleCVE-2013-0074 (Silverlight) integrates Exploit Kits
Angler EK is definitely on the move. It's not a huge surprise when we can speculate that the team behind is the same that was first using Cool EK (Paunch VIP customer) and is behind the Reveton...
View ArticleMagicTraffic : a look inside a Zaccess/Sirefef affiliate
Thx @Horgh_rce for the time spent studying different sets of samples.There are at least 2 affiliates spreading Zaccess/Sirefef.- MagicTraffic- Sti PpiMaybe (?) a third one : SmartPrivate (?) (which...
View ArticleReveton planting "evidences" on "the crime scene"
Fast post on last Reveton move. Thanks @MalwareSigs & @Ash4er for inputs :)Reading Lavasoft Security Bulletin: November 2013 I saw a Ransomware design that was new to me. Lavasoft was associating...
View ArticleOne ...random...Gameover Zeus Team Pony sample Story
Pony Icon above fragment ofKhaled Desouki Photo tied to Tharir Square eventsPost to share some intel on the "Moar Pony" sample pointed by SpiderLabs in the "Moar Pony" FAQ.<edit 2013-12-09>Have...
View Article