Markov models : detecting malware through language recognition

Hi there , in this blog I’m going to give an introduction to the use of probability models for (written) language recognition to detect malware and demonstrate it with a .net / powershell implementation of a Markov model . It’s not uncommon encounter text  that was generated randomly by malware. …

Hunting for Ransomware with Powershell

  This is part 2 of the series on remote IOC scanning with Powershell. We left off with our script being able to scan remotely for the existence of files and registry keys. The limitation we had so far was that when we specified registry keys in the HKEY_CURRENT_USER hive …

Malvertising: how ads can become more than just annoying

Malvertising, a portmanteau of malicious advertising, is an interesting technique to spread malware which leverages the omnipresence of online ads in today’s internet landscape. It’s basically malicious adverts which will try to infect unsuspecting users when the ads are loaded or clicked upon. Fox-IT reported about a large scale malvertising campaign …

Petya Ransomware: a new approach to messing up your files

A new kind of ransomware has been noticed recently. It’s called Petya (according to Wikipedia this is a Bulgarian female given name or a Russian diminutive for the male given name Piotr). The Petya ransomware takes a whole new approach to messing up your computer. Unfortunately this new crypto takes …

7 Hot Tips To Destroy Your Business Quickly and Efficiently aka How To Get Hacked

Want to have some laughs at work ? As in : “Hahaha, remember when we got breached Bob ? You should’ve seen the look on our boss’ face!”  Want to learn how to get “Pwned” quickly ? You’ve come to the right address, because Cyberforce.be is offering you some piping …

Apparently hacking is now legal (if you’re British Intelligence)

The GCHQ HQ – Image: Flickr, UK Ministry of Defence In September 2014 the news broke that Belgacom, one of the largest Belgian telecom companies was infiltrated by GCHQ, Britain’s intelligence service and apparently these people were monitoring all traffic flowing through Belgacom’s (now called Proximus) servers. This news came …

When Malware Gets Up In Your Cloud

Many people utilizing cloud computing, whether for storage or for actual computing,  believe that they are immune for viruses.  However, that is not the case.  An interesting story from  Krebsonsecurity.com reported that a company had all its files on the cloud server infected by ransomware. The problem started when an …