February 2019

Research

How to Attack and Defend a Prosthetic Arm

Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm’s positions, etc. And just like other IoT devices, this valuable invention must be checked for vulnerabilities. In our research, we focused on those attack vectors that can be implemented without the arm owner’s knowledge.


  • Subscribe

  • Reports

    APT trends report Q1 2022

    This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.

    Lazarus Trojanized DeFi app for delivering malware

    We recently discovered a Trojanized DeFi application that was compiled in November 2021. This application contains a legitimate program called DeFi Wallet that saves and manages a cryptocurrency wallet, but also implants a full-featured backdoor.

    MoonBounce: the dark side of UEFI firmware

    At the end of 2021, we inspected UEFI firmware that was tampered with to embed a malicious code we dub MoonBounce. In this report we describe how the MoonBounce implant works and how it is connected to APT41.

    Subscribe to our weekly e-mails

    The hottest research right in your inbox