Get a Pentest and security assessment of your IT network.

News

How Destover Evades Detection

Damballa discovers new toolset linked to Destover Attackers arsenal helps them to broaden attack surface. Destover and setMFT are related via the lengthy license key used with the Eldos driver used by Destover to gain direct access to disk. The utilities would be used during an attack to evade detection while moving laterally through a network to broaden the attack surface. Both utilities had usage statements and were named as setMft and afset. Timestomping is used to copy the timestamp settings from a source file on disk to a destination file.”]

Source: https://informationsecuritybuzz.com/articles/new-toolset-linked-to-destover-attackers-arsenal-helps-them-to-broaden-attack-surface/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months