Events

SecTor – Security Education Conference 2012, Toronto / CA

I’m sending greetings from Canada, where I’m attending the 6th annual SecTor Security Education Conference in the very impressive city of Toronto.

With almost 70 talks and nearly 50 exhibitors there are a lot of opportunities to learn about new techniques and meet interesting people from all over the world. In addition there is a “LockPick Village”, a robotics-showcase and a capture the flag competition located in the expo area.

Last but not least, Kaspersky Lab is exhibiting in the expo area.

On Tuesday, representing Kaspersky Lab, Dennis Fisher gave a talk about protecting your corporate smartphones from malware and targeted attacks. Among other sessions, I attended very good talks about anti-forensic techniques and their mitigations by Michael Perklin, advanced intrusion methods and workarounds if Metasploit fails by Ryan Linn, and a talk about reversing patches for exploit creation, pen-testing or fun by Bharat Jogi.

At his talk, Jogi described how quick malware authors react on patch-releases. CVE-2012-0003 was patched on 10th of January 2012 – on 26th of January 2012 the first malware was seen in the wild exploiting that bug which leads to a remote code execution vulnerability via MIDI-files.

Over all it has been a nice conference so far, however, additional seats should be provided as some of the talks were a little bit too crowded.

SecTor – Security Education Conference 2012, Toronto / CA

Your email address will not be published. Required fields are marked *

 

Reports

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

Subscribe to our weekly e-mails

The hottest research right in your inbox