Get a Pentest and security assessment of your IT network.

News

A Flame, Duqu Test-Drive

A security researcher demonstrated how he was able to inject his own proof-of-concept malware into the Duqu dropper exploit. He also reconfigured “mini-Flame” to create his own command-and-control servers. The Flame authors may have purposely limited the scope of their malware to avoid them being abused by other attackers, he says. The code was relatively limited, possibly on purpose, possibly because Flame’s Windows installer files are signed. The attack only works in a local subnet, not across the Internet.”]

Source: https://www.darkreading.com/attacks-breaches/a-flame-duqu-test-drive

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Thousands of Magento websites compromised to serve malware

News

Office 365 Secure Score: An Introduction