Malware
Blog Posts
Using Alternate Data Streams in the Collection and Exfiltration of Data
In this blog post, we describe how attackers obscure their activity via alternate data streams (ADSs) and how to defend against malware attacks that employ ADSs.
Read More• By Dustin D. Updyke , Molly Jaconski
In Cybersecurity Engineering
Vulnerabilities: Everybody’s Got One!
In this post, Leigh Metcalf describes how she pulled data from the malvuln project to explore recent vulnerabilities in both malware and non-malware to study the differences.
Read More• By Leigh B. Metcalf
In CERT/CC Vulnerabilities
Business Email Compromise: Operation Wire Wire and New Attack Vectors
In June 2018, Federal authorities announced a significant coordinated effort to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals....
Read More• By Anne Connell
In Reverse Engineering for Malware Analysis
Path Finding in Malicious Binaries: First in a Series
In a previous post, I discussed the Pharos Binary Analysis Framework and tools to support reverse engineering of binaries with a focus on malicious code analysis. Recall that Pharos is....
Read More• By Jeff Gennari
In Reverse Engineering for Malware Analysis
Security Begins at the Home Router
In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI, as well as a number …
Read More• By Vijay S. Sarvepalli
In Reverse Engineering for Malware Analysis
Big-Data Malware: Preparation and Messaging
Part one of this series of blog posts on the collection and analysis of malware and storage of malware-related data in enterprise systems reviewed practices for collecting malware, storing it, …
Read More• By Brent Frye
In Reverse Engineering for Malware Analysis
Big-Data Malware: Collection and Storage
The growth of big data has affected many fields, including malware analysis. Increased computational power and storage capacities have made it possible for big-data processing systems to handle the increased …
Read More• By Brent Frye
In Reverse Engineering for Malware Analysis
Data Science, Blacklists, and Mixed-Critical Software: The Latest Research from the SEI
Discover recently released SEI publications in early lifecycle cost estimation, host protection strategies, AADL, and more in this SEI Blog post.
Read More• By Douglas Schmidt (Vanderbilt University)
In Reverse Engineering for Malware Analysis
Threat Analysis Mapping, Connected Vehicles, Emerging Technologies, and Cyber-Foraging: The Latest Research from the SEI
Recently published SEI reports highlight the latest work of SEI technologists in estimating program costs early in the development lifecycle, threat analysis mapping, risks and vulnerabilities in connected vehicles, emerging …
Read More• By Douglas Schmidt (Vanderbilt University)
In Reverse Engineering for Malware Analysis
Static Identification of Program Behavior using Sequences of API Calls
Learn how to statically characterize program behavior using API calls and how the SEI automated this reasoning with the malware analysis tool ApiAnalyzer.
Read More