<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

ENSILO BLOG

You are Reading:  

Analyzing Furtim: Malware that Avoids Mass-Infection

Overview

Recently we came across a new malware strain, first discovered by @hFireF0X, and at point of discovery, it was not detected by any of the 56 anti-virus programs tested by VirusTotal...

Read More

ArdBot: A Malware Under Construction

Recently we came across a new sample of the ArdBot malware, appearing on kernelmode, credited to R136a1.

Read More

A Technical Breakdown of ModPOS

ModPOS is the latest in the string of POS malware that’s making the news. As its family name implies, this malware is intent on one: stealing credit card information.

Read More

Moker, Part 2: Capabilities

A few days ago, we published a blog entry on an advanced malware – Moker, and discussed the different challenges that Moker placed to avoid detection and anti-dissection.

Read More

Moker, Part 1: dissecting a new APT under the microscope

Recently, we came across Moker, an advanced malware residing in a sensitive network of a customer. Since the malware did not try to access an external server, but rather tamper with the system...

Read More

CATEGORIES

FEATURED ARTICLES

tag cloud