Are You on “Target” For a Security Breach?
IT security professionals should be asking themselves that all the time. As we are all aware of the Target Stores compromise, these types of attacks occur every second of every day throughout the...
View ArticleBot of the Day: Sharik
We recently came across a sample that exhibited interesting behavior in plaintext, which makes our job a lot easier when writing signatures. We’re going to briefly walk through our basic analysis...
View ArticleScarePakage - Fake FBI RansomLocker
A RansomLocker Android application dubbed ScarePakage was brought to our attention by an article from Lookout, so we decided to dig into the malicious app to discover if it has any network-based IOCs,...
View ArticleSuricata Training Dates Announced
OISF has 2 training dates announced, and more to come! The first is in parallel with Black Hat Amsterdam 2014. Just a few weeks away. If you're attending BH please consider attending Suricata training...
View ArticleDyre and Upatre Under Constant Development
IntroductionThe Dyre trojan (aka Dyreza, Battdil) is actively developed malware employed by actors that seek to steal login credentials used to access the online banking websites of financial...
View Article