Malware Unpacking Methods (Part 2): Weak Encryption Algorithms

Malware Unpacking Methods (Part 2): Weak Encryption Algorithms

A few days ago, I began writing a series of articles about tools and methods for unpacking malware. Each malware or packer is different, and sometimes general methods do not work for unpacking. However, common characteristics can sometimes be found among them. For example, packers often use weak encryption algorithms, which can be cracked. In … Read more

Advanced Threat Intelligence Analysis

Advanced Threat Intelligence Analysis

2024.12.13~12.19 Attack group intelligence Mask APT reappeared, targeting Latin American organizations. Attack Bitter APT utilized WmRAT and MiyaRAT malware to attack Turkish defense organization APT-C-36 (Blind Eye Eagle), continuously launching attacks against Colombia. Gamaredon deployed in former Soviet states Andr…

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker, produced by Rapid7, is a network scanning tool for default password credentials of IoT devices, capable of scanning specific IoT devices to determine whether they are using default or factory-set password credentials. Tool Introduction The cause of the large-scale network outage in the United States was investigated to be malware exploiting default password credentials … Read more

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker, developed by Rapid7, is a tool for scanning default password credentials of IoT devices. It can scan specific IoT devices to determine if they are using default or factory-set passwords. Tool Introduction The recent large-scale network disruption in the United States was investigated to be caused by malware exploiting default password credentials of IoT … Read more