Tag Archives: modern malware

In the Wake of REGIN: Accounting for the State Sponsored Threat

Recently the Symantec Corporation uncovered a highly sophisticated, modular piece of malware that has been infecting computers in a variety of countries as far back as 2008. Backdoor.regin has characteristics beyond those of modern malware and is already generally accepted as a product of nation-state cyber espionage. The implant likely took considerable resources and time […]

An Open Letter to Antivirus Vendors: It is Time for Antivirus Software to Flag Memory Dumping

Dear Antivirus Vendors, On more and more incident response investigations, my clients (victims) have been asking the question “Why didn’t our Antivirus software detect the malware when we always keep it up to date?” I respond by telling them that they had targeted malware on their system. Their follow up question usually is whether antivirus […]

NEXT-GEN MALWARE DEFENSE

‘Malware’ has come a long way. From merely annoyance applications coded by bored engineering students for notoriety all the way to professionally developed stealth applications for financial gains and stealing state secrets. According to Verizon’s 2012 Data Breach Investigations Report, 69% of the breaches were attributed to malware infections. The business impact of such Advanced Malware […]

HALOCK INVESTIGATES: Network Chatter from China

  Imagine one hundred container ships full of the most valuable U.S. assets heading to China every day. Diamonds, gold, oil, John Deere Tractors, priceless artwork, Chevy Corvettes, life-saving artificial hearts, books from our historic libraries, soybeans, the latest Intel® processors, Redwood trees, the genuine Constitution of the United States of America, the Statue of […]

Current State of Cloud Based Security

At HALOCK®, we recognize there’s a tremendous amount of concern surrounding cloud-based security. Most of the concern is focused around the risk of moving assets to the cloud and that worry has slowed down the adoption of virtualized infrastructure. It has been a challenge to find solid data surrounding cloud security risks. So when one […]

Nice Infrastructure…. Mind If I Borrow it??

We talk a lot with our clients about the importance of due care and due diligence when it comes to compliance and risk management.  In order to perform proper due diligence, it’s important to understand the nature of the attacks being directed against your infrastructure, the motivation behind them, and what steps are reasonable to […]

10 Years of Malware and Threats

Again, from a Dark Reading article, Microsoft Studies 10 Years of Malware and Threats.  Microsoft, in celebration of the 10-year anniversary of the launch of its Trustworthy Computing Initiative, published a special edition of its Security Intelligence Report.  They looked at the past 10 years and how the threat landscape has evolved.