[MalDev-17] Custom Encryption Algorithms and Elliptic Curves

[MalDev-17] Custom Encryption Algorithms and Elliptic Curves

03 – Custom Encryption Algorithms Common hash algorithms such as Caesar, Base64, and MurmurHash have come under scrutiny from security researchers, often being used as features to identify malware. Therefore, it is advisable to use custom or less common algorithms. base58 encryption cmd.exe #include <winsock2.h> #include <string.h> #include <stdio.h> #include <stdlib.h> const char * const … Read more

Linux Security: Easily Scan Your Servers for Rootkits

Linux Security: Easily Scan Your Servers for Rootkits

Open-source tools like Linux Malware Detect and Chkrootkit can alert you to unwanted visitors on your server. Translated from “Linux Security: Scan Your Servers for Rootkits With Ease” by Jack Wallen. Linux is one of the most secure operating systems on the planet. However, nothing is absolutely secure, and if a server is connected to … Read more

A Brief Analysis of Hyperjacking Attacks in Virtualized Environments

A Brief Analysis of Hyperjacking Attacks in Virtualized Environments

In September 2022, security researchers discovered a rare new type of attack method known as Hyperjacking. Attackers deployed an infection implant within VMware virtualization software to control the infected virtual machine systems and evade detection. It is important to emphasize that the danger of this attack lies not in exploiting external remote code execution vulnerabilities, … Read more

Common Security Threats and Protections in Embedded Systems

Common Security Threats and Protections in Embedded Systems

Due to the uniqueness of embedded systems, there are many security threats. Firstly, because embedded systems have limited resources, with small RAM and ROM and limited processing speed, they cannot implement multiple security defense measures simultaneously, making them vulnerable to attacks. Secondly, the diverse deployment environments of embedded systems, such as industrial production environments, medical … Read more

Unpacking Malware: Weak Encryption Algorithms

Unpacking Malware: Weak Encryption Algorithms

A few days ago, I started writing a series of articles about tools and methods for unpacking malware. Each piece of malware or packer is different, and sometimes a universal method cannot be used for unpacking. However, common characteristics can sometimes be found. For example, packers often use weak encryption algorithms, and breaking these algorithms … Read more

Botnets Trigger IoT Security Battle: Discussing Embedded Security

The rise of Internet of Things (IoT) botnets has become a security threat in emerging industries such as smart homes, smart cities, and industrial networking. Distributed Denial of Service (DDoS) attacks from botnets have been around for some time, and IoT botnets are not new either. Botnets and Their Potential Threats A botnet refers to … Read more

Analysis and Solution of an Unexpected Mining Trojan Virus

Analysis and Solution of an Unexpected Mining Trojan Virus

Since I changed my job position, I haven’t researched reverse security for about 4 or 5 years. I thought I would have no connection with this profession again, but unexpectedly, today I had a chance to “enjoy” it again due to a random opportunity. Recently, my colleagues in the company have been constantly reporting that … Read more

Five Key Lessons from Industrial Control System Attacks

Five Key Lessons from Industrial Control System Attacks

Attacks on industrial control systems are becoming more frequent, yet lack novelty. Imagine it’s 1903, and you are standing in front of a large inn on a remote peninsula in Bodmin, Cornwall, England. Despite the massive antenna next to the inn and large kites occasionally lifting the antenna higher, you might not realize that you … Read more

Industrial Control System Cybersecurity: Attack Types and Prevention

Industrial Control System Cybersecurity: Attack Types and Prevention

Catastrophic incidents may result from insecure industrial control systems. Enhancing cybersecurity across the entire system can be achieved through four steps. Despite the fact that cybersecurity has always been a major concern for any industry, it is commonly believed that attacks only lead to loss of proprietary data, becoming victims of espionage, and facing threats … Read more

Vulnerabilities in Industrial Control Systems

Vulnerabilities in Industrial Control Systems

Source: “Intelligent Manufacturing Information Security Technology” (Authors: Qin Zhiguang, Nie Xuyun, Qin Zhen) This book has been published, please see the end for details~ “1. Security Incidents in Industrial Control Systems“ With the deep integration of cyberspace and physical space, the impact of cyber issues on reality is becoming increasingly severe. Industrial control systems, as … Read more