<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

ENSILO BLOG

You are Reading:  

Yotam Gottesman, Security Researcher, enSilo

Yotam Gottesman, Security Researcher, enSilo
Unpacking junkie. A knack for reverse engineering only to re-engineer later. Ping me.

latest post by Yotam Gottesman, Security Researcher, enSilo

Command Injection/Elevation – Environment Variables Revisited

Windows environment variables can be used to run commands and can also be used to bypass UAC, allowing an attacker with limited privileges to take complete control of the system.

Read More

Adding UAC Bypass to the Attacker’s Tool Set

Recently our researchers revealed a new way that attackers can bypass Microsoft’s User Access Control (UAC) mechanisms.

Read More

Elastic Boundaries – Elevating privileges by environment variables expansion

Even though any process is provided variables from its environment – they are often overlooked by users, developers and sometimes even the OS itself.

Read More

Furtim: The Ultra-Cautious Malware

Furtim is the latest stealthy malware, found in the wild, and its discovery is credited to @hFireF0X.

Clearly, Furtim’s developers were more interested in keeping their malware hidden from...

Read More

Analyzing Furtim: Malware that Avoids Mass-Infection

Overview

Recently we came across a new malware strain, first discovered by @hFireF0X, and at point of discovery, it was not detected by any of the 56 anti-virus programs tested by VirusTotal...

Read More

ArdBot: An Inside Look into Malware in the Making

Crediting R136a1 who published malware samples a few days ago on a forum, we found these samples under development. We quickly went ahead and analyzed one, allowing us a unique view into malware...

Read More

ArdBot: A Malware Under Construction

Recently we came across a new sample of the ArdBot malware, appearing on kernelmode, credited to R136a1.

Read More

A Technical Breakdown of ModPOS

ModPOS is the latest in the string of POS malware that’s making the news. As its family name implies, this malware is intent on one: stealing credit card information.

Read More

Moker, Part 2: Capabilities

A few days ago, we published a blog entry on an advanced malware – Moker, and discussed the different challenges that Moker placed to avoid detection and anti-dissection.

Read More

Moker: A new APT discovered within a sensitive network

Recently, enSilo found an Advanced Persistent Threat (APT) residing in a sensitive network of a customer. This APT appears to be a Remote Access Trojan (RAT) that is capable of taking complete...

Read More

CATEGORIES

FEATURED ARTICLES

tag cloud