Malware analysis: decoding Emotet, part 2

Credit to Author: Vishal Thakur| Date: Thu, 07 Jun 2018 15:00:00 +0000

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!

Categories:

Tags:

(Read more…)

The post Malware analysis: decoding Emotet, part 2 appeared first on Malwarebytes Labs.

Read more

A week in security (April 09 – April 15)

Credit to Author: Malwarebytes Labs| Date: Mon, 16 Apr 2018 15:05:00 +0000

A roundup of the security news from April 09 – April 16, including fake updates, safe messaging, and Facebook spammers. And our quarterly CTNT report is out.

Categories:

Tags:

(Read more…)

The post A week in security (April 09 – April 15) appeared first on Malwarebytes Labs.

Read more

Week in security (April 09 – April 15)

Credit to Author: Malwarebytes Labs| Date: Mon, 16 Apr 2018 15:05:00 +0000

A roundup of the security news from April 09 – April 16, including fake updates, safe messaging, and Facebook spammers. And our quarterly CTNT report is out.

Categories:

Tags:

(Read more…)

The post Week in security (April 09 – April 15) appeared first on Malwarebytes Labs.

Read more

A week in security (March 26 – April 01)

Credit to Author: Malwarebytes Labs| Date: Mon, 02 Apr 2018 16:03:51 +0000

A roundup of notable security news from March 26 to April 1, including data breaches, encryption, exploit kits, and more.

Categories:

Tags:

(Read more…)

The post A week in security (March 26 – April 01) appeared first on Malwarebytes Labs.

Read more

Encryption 101: Decryptor’s thought process

Credit to Author: Vasilios Hioureas| Date: Tue, 27 Mar 2018 15:00:00 +0000

In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live example of a ransomware in detail, and talked about encryption weaknesses. In this part of the encryption 101 series, we will begin wrapping it up by going into detail on a ransomware with weak…

Categories:

Tags:

(Read more…)

The post Encryption 101: Decryptor’s thought process appeared first on Malwarebytes Labs.

Read more