InfoSec

USB Armageddon Unleashed

In case you missed it, a USB exploit called BadUSB was announced at BlackHat this year. It unveils a method of re-writing the firmware of a USB device in such a way as to create undetectable, malware capable of anything, on Windows machines, MACs and Linux devices, and you don’t have any tools to stop […]

ShellShock – the bash bug

Bash bug. We’re not talking about what to do when we find a cockroach – we’re talking about CVE-2014-6271/CVE-2014-7169, a remote vulnerability in what is arguably the most popular Unix/Linux command interpreter, and all versions of it since 1994 through…oh…now. This potentially allows virtually any hacker to get any (full) access to almost any non-Windows […]

New Cryptolocker decryption tool – help for victims

Security journalist Brian Krebs reports that FireEye and Fox-IT have put together a decryption tool for victims of the Cryptolocker trojan. Uploading an encrypted file (choose one with non-sensitive data) will generate the decryption key with which you can recover your files from the encryption ransom-ware. Note that this only works with the original Cryptolocker, […]

Malware lives in hidden registry entry, uses no files

According to G Data Software, a persistent malware hides itself in a registry entry, which cannot be displayed by regedit, and runs as a Powershell script, even on systems where script processing is disabled. This malware does not use any actual files, thus there is nothing for an AV scanner to scan. Fortunately, SysInternals tools […]