Basic Malware Analysis: Malicious Data Mining E-Mail Attachment

Lovely… simply lovely

CYBER ARMS - Computer Security

Malicious E-mail Message

Oh look, an unsolicited incoming Fax Report. Odd it is a fax transmission, but our company doesn’t even have a fax server. But it is on 2013 Recruitment Planning – I better open it!

Corporate networks are being slammed with e-mails like the one above. Looks innocent enough, but if a user did indeed open it, the malicious attachment that anti-virus didn’t detect would scan the victim’s hard drive for data and upload it to a malicious server. All undetected by the unsuspecting user.

I have seen several versions of this same attack in the last week. So let’s take a closer look.

When these attacks first started, only 2 anti-virus engines would detect the attachment as a malicious file. AV engines are catching on to it now and are detecting it as a generic Trojan. As a matter of fact, if I try to open this message today, I…

View original post 925 more words

Quintessential Programming Languages

O.K I’d like to start you off with a list of several programs which you should choose from and study because to get a system protected you want to know how it works consider basic computer lessons (there are several on you-tube)

You would like to learn (or at least take a peek at)

Binary (The very blood of all computer systems)

Python (Study Thoroughly if you want to become a hacker yourself)

Ruby (Another Good Hacking Program)

JavaScript (Good for creating games) 

C

C++

A

And here comes a motherlode of ones I don’t even know about (thank you wikipedia)

[edit]B

[edit]C

[edit]D

  • D
  • DASL (Datapoint’s Advanced Systems Language)
  • DASL (Distributed Application Specification Language)
  • Dart
  • DataFlex

[edit]E

[edit]F

[edit]G

[edit]H

[edit]I

[edit]J

[edit]K

[edit]L

[edit]M

[edit]N

[edit]O

[edit]P

 And this is only a small sample of different languages out there (there are several experimental ones)

Welcome!

O.K before you are freaked out by the theme or domain name hear me out. First off I want to make clear we are not the bad guys we are the guys who help you and before I launch into a complex lecture about hacking I may as well start with the basics.

You have 3 main category’s 

.White Hats

.Grey Hats

.Black Hats

Now the White Hats are the angels of the hacking community they make up about 5% of it they are the guys who help you and your system never hack for what some might see as “Evil”.

Now Grey Hats make up about 90% of the hacker community (us) they are the guys who are bad but aren’t too bad, they are the guys in between, who have a slight vengeful twang. For example Tommy hacks Bill’s system maliciously now Bill isn’t going to sit idly and let that happen he launches an attack against Tommy so the attack on his system never happens.

Thenn you have your Black Hat hackers these are the bad guys they make up, you guessed it about 5% of the hacker community they simply hack systems to steal info, destroy systems, and all around bad stuff.

And that takes me to why I’m here, I’m the guy who helps you and arms you with the tools to protect your system.

Good Luck -HFH Staff

 

.