Tag: malware detection

  • Hacker News: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries Source: Hacker News Title: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries Feedly Summary: Comments AI Summary and Description: Yes Summary: This text details the challenges associated with analyzing malware written in Go that utilizes the garble obfuscator, focusing on the introduction of the GoStringUngarbler tool, which automates the deobfuscation process of string literals.…

  • Cloud Blog: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries/ Source: Cloud Blog Title: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries Feedly Summary: Written by: Chuong Dong Overview In our day-to-day work, the FLARE team often encounters malware written in Go that is protected using garble. While recent advancements in Go analysis from tools like IDA Pro have simplified the analysis process, garble…

  • Cloud Blog: Cloud CISO Perspectives: New AI, cybercrime reports underscore need for security best practices

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-new-ai-cybercrime-reports-underscore-need-security-best-practices/ Source: Cloud Blog Title: Cloud CISO Perspectives: New AI, cybercrime reports underscore need for security best practices Feedly Summary: Welcome to the first Cloud CISO Perspectives for February 2025. Stephanie Kiel, our head of cloud security policy, government affairs and public policy, discusses two parallel and important security conversations she had at…

  • Cloud Blog: Using capa Rules for Android Malware Detection

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/capa-rules-android-malware-detection/ Source: Cloud Blog Title: Using capa Rules for Android Malware Detection Feedly Summary: Mobile devices have become the go-to for daily tasks like online banking, healthcare management, and personal photo storage, making them prime targets for malicious actors seeking to exploit valuable information. Bad actors often turn to publishing and distributing malware…

  • Unit 42: Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript

    Source URL: https://unit42.paloaltonetworks.com/?p=137970 Source: Unit 42 Title: Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript Feedly Summary: This article demonstrates how AI can be used to modify and help detect JavaScript malware. We boosted our detection rates 10% with retraining. The post Now You See Me, Now You Don’t: Using…

  • Hacker News: LLVM-Powered Devirtualization

    Source URL: https://blog.thalium.re/posts/llvm-powered-devirtualization/ Source: Hacker News Title: LLVM-Powered Devirtualization Feedly Summary: Comments AI Summary and Description: Yes Summary: The text elaborates on the techniques and methodologies for deobfuscating virtualized binaries, primarily utilizing dynamic taint analysis and LLVM optimization strategies. This study showcases new approaches to reverse engineering obfuscated binaries, which is critical in the context…

  • Hacker News: North Korean hackers create Flutter apps to bypass macOS security

    Source URL: https://www.bleepingcomputer.com/news/security/north-korean-hackers-create-flutter-apps-to-bypass-macos-security/ Source: Hacker News Title: North Korean hackers create Flutter apps to bypass macOS security Feedly Summary: Comments AI Summary and Description: Yes Summary: North Korean threat actors are exploiting macOS by creating trojanized applications, particularly targeting cryptocurrency themes, that bypass Apple’s security mechanisms. These apps, developed using the Flutter framework, present a…

  • Hacker News: The performance of hashing for similar function detection

    Source URL: https://edmcman.github.io/blog/2024-01-11–fuzzy-hashing-for-code-comparisons/ Source: Hacker News Title: The performance of hashing for similar function detection Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves deeply into malware reverse engineering and explores advanced hashing techniques like PIC hashing and fuzzy hashing. It highlights the significant challenges faced in identifying equivalent functions across different…

  • Cisco Talos Blog: Writing a BugSleep C2 server and detecting its traffic with Snort

    Source URL: https://blog.talosintelligence.com/writing-a-bugsleep-c2-server/ Source: Cisco Talos Blog Title: Writing a BugSleep C2 server and detecting its traffic with Snort Feedly Summary: This blog will demonstrate the practice and methodology of reversing BugSleep’s protocol, writing a functional C2 server, and detecting this traffic with Snort.  AI Summary and Description: Yes Summary: The text provides an in-depth…