This is an announcement for the upcoming Cysinfo cyber security community meetup on 29th July 2017 in Bangalore, India. This meet is completely free and doesn’t require any registration or any other formalities to attend. The meet will start at 9:30 AM IST. We would like to thank  Amrita University and Amrita TBI for supporting and […]


A Journey From Loki Bot Campaign To Venom Spyware

SUMMARY When it comes to Macro Malware, several people try to finish it off with two workarounds, Disable Macro (GPO) and user awareness. That said what if a malicious document doesn’t use Macro codes to do its malicious tasks? What if a document is exploiting a vulnerability to do its malicious activities? That said, Let […]


Cyber Attack Impersonating Identity of Indian Think Tank to Target Central Bureau of Investigation (CBI) and Possibly Indian Army Officials

In my previous blog posts I posted details of cyber attacks targeting Indian Ministry of External Affairs and Indian Navy’s Warship and Submarine Manufacturer. This blog post describes another attack campaign where attackers impersonated identity of Indian think tank IDSA (Institute for Defence Studies and Analyses) and sent out spear-phishing emails to target officials of […]


Aadhar:  Good, Bad And Ugly

Before I begin I would like to quote current Attorney General of India “The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 […]


Analysis of Shadow Brokers Release – Operation Center

We have always been curious to know about what goes on inside the state sponsored security agencies like NSA (National Security Agency). Since the agency is known to operate on multiple spying operations in the past for tracking criminals and terrorists, it might sometimes need the use of zero day exploits to get into targeted […]


Episode 3 – Shellcode Analysis with APITracker

Text: Audience Level: Beginner to Medium. Few months back we released our new tool APITacker. The idea behind the tool is more mature than the tool itself. Using APITracker we can hook APIs on large scale from DLLs to track the execution of the sample. APITracker is based on pydbg python debugger. Before we move […]


New Password Protected Macro Malware evades Sandbox and Infects the victims with Ursnif Malware !!

These days, Along with the unforeseen climatic conditions, several unpredictable malware campaigns are also occurring across the connected world. Mostly Offenders are relying on spam mails and the associated malicious Macros, to drop and infect the targeted victims with various other atrocious malware. Studies shows 95% of successful security attacks created by Human mistakes!! Security sensitive […]


10th Quarterly Meetup – 25th February 2017

In this meet, Jiggyasu Sharma presented on “Tracking Attacks Using Hospital Honeypots” , Abhishek Bhuyan presented on “Security Analytics using ELK stack” , Heeraj Nair presented on “XXE – XML External Entity Attack” , Monnappa K A presented on “Linux Malware Analysis” , Aswin M Guptha presented on “Introduction to Binary Exploitation” and Amit Malik presented on “ATM Malware: […]