Category: Malware Analysis

08/03/10

Permalink 02:11:30 pm, by Zach Brewer, 41 words
Categories: Malware Analysis, Application Whitelisting, Bit9

Priveon Labs Publishes New White Paper: Using Application Whitelisting to Prevent Real-World Threats

August 3rd, 2010 - Priveon Labs publishes new Bit9 Parity document. Using a real-world attack scenario in a controlled lab environment, a new Priveon Labs white paper demonstrates successful Bit9 Parity threat mitigation. The white paper can be view… more »

05/11/09

Permalink 09:21:26 am, by Zach Brewer, 116 words
Categories: Malware Analysis, General Security

Conficker E, We Hardly Knew Ye

On April 8th, Conficker updated itself to variant E. (An only half-serious question: Do these warrant new variants if malware is updating itself? Maybe we should call them Conficker ServicePack 1 through X) Some of the changes made to variant "E" in… more »
Permalink 09:21:20 am, by Zach Brewer, 267 words
Categories: Malware Analysis, General Security

Conficker and Encryption

Conficker authors have shown adaptability in using and changing the many types of encryption and hashing algorithms used by Conficker including: - SHA-1 (Conficker A/B - replaced by MD6 in C) - 4096-bit RSA key (C and later) - RC4 - MD6 At a hig… more »

04/10/09

Permalink 12:17:15 pm, by Zach Brewer, 299 words
Categories: Malware Analysis, General Security

New Conficker Variant? (WORM_DOWNAD.E)

The internet as we know it did not end on April 1st as some media outlets would have lead us to believe. What did happen was that a very well-written worm called conficker started scanning a pool of 50,000 randomly generated domain names for instruction… more »

03/31/09

Permalink 11:23:37 pm, by Zach Brewer, 195 words
Categories: Cisco Security Agent, Malware Analysis

Excellent Conficker Analysis (All Currently Known Variants)

As everyone is well aware, conficker worm variants have been exploiting MS-08-067 since November 2008 (possibly earlier). Conficker continues to spread depite the fact that a patch has been out for this vulnerability since October of 2008. The latest "… more »

1 2 3 4 >>

Priveon, Inc.

Today's complex security and networking solutions require a great deal of knowledge to successfully support and operate. Priveon uses the field experience of its expert staff to develop and maintain a positive reinforcement loop between business practices and to provide the latest information to our customers. The information posted here is supported by Priveon subject-matter experts.

Search

XML Feeds

Archives