6

11th Meetup – Understanding Evasive Hollow Process Injection techniques

In this meet, Monnappa K A delivered presentation on “Understanding Evasive Hollow Process Injection techniques”   Demo1: Investigating Taidoor’s Evasive Hollow Process Injection Demo2: Investigating Kuluoz’s Evasive Hollow Process Injection. Demo3: Investigating Modified Kuluoz’s Evasive Hollow Process Injection Demo4: Investigating Kronos malware’s Evasive Hollow Process Injection  

32

CYSINFO CYBER SECURITY MEETUP – 29TH July 2017

This is an announcement for the upcoming Cysinfo cyber security community meetup on 29th July 2017 in Bangalore, India. This meet is completely free and doesn’t require any registration or any other formalities to attend. The meet will start at 9:30 AM IST. We would like to thank  Amrita University and Amrita TBI for supporting and […]

9

A Journey From Loki Bot Campaign To Venom Spyware

SUMMARY When it comes to Macro Malware, several people try to finish it off with two workarounds, Disable Macro (GPO) and user awareness. That said what if a malicious document doesn’t use Macro codes to do its malicious tasks? What if a document is exploiting a vulnerability to do its malicious activities? That said, Let […]

23

Cyber Attack Impersonating Identity of Indian Think Tank to Target Central Bureau of Investigation (CBI) and Possibly Indian Army Officials

In my previous blog posts I posted details of cyber attacks targeting Indian Ministry of External Affairs and Indian Navy’s Warship and Submarine Manufacturer. This blog post describes another attack campaign where attackers impersonated identity of Indian think tank IDSA (Institute for Defence Studies and Analyses) and sent out spear-phishing emails to target officials of […]

7

Aadhar:  Good, Bad And Ugly

Before I begin I would like to quote current Attorney General of India “The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 […]

6

Analysis of Shadow Brokers Release – Operation Center

We have always been curious to know about what goes on inside the state sponsored security agencies like NSA (National Security Agency). Since the agency is known to operate on multiple spying operations in the past for tracking criminals and terrorists, it might sometimes need the use of zero day exploits to get into targeted […]