That malware knows that they are watching it

It is extremely common for advanced malware not only to hide its code with different packers, but also to try to detect if it is being analyzed dynamically through a sandbox. If they realize that they are watching it, they

Security Research (VIII) – Papers, Language

We return to one of the foundations of scientific life: writing contributions or papers. Previously, we had talked about the structure that interested us in Computer and Security of the particular system: (i) summary, (ii) introduction, (iii) [background], (iv) method,

console.log(blog 1095 days up)

Although it seems like we started yesterday , it’s been 3 years. We have learned a lot during this time, and we hope you too. Many thanks to all of you who have collaborated, and of course, to all the

Hardening binaries (VI) – Format Strings

Although vulnerabilities caused by improper use of format strings may not seem like a theme of the last century, a small search in the CVE database shows us that these errors are still happening. The danger of format string is given

Preventing scam nowadays

The types, thematic, or rather, the scam campaigns, have been evolving over time as well as their means of distribution. Nowaydays , among the most typical campaigns are, among others, those that make the victim believe that he has won (mysteriously)

Legal framework of impersonation (II)

To continue with the list of the most habitual behaviors that can lead to criminal offense, and continuing in the line of Phishing and Farming, as third variety we must not fail to include the following behavior that also has

When money was not everything in malware

Although for many it’s hard to believe, there was a time when malware was not a tool created to generate as much money as possible. The main motivations of those old-school hackers were such earthly things as fun or some

Security Research (VII) – The reject

Well yes, we have already done a job that we believe has the level (and probably it has) and we receive an email with the fateful phrase “We regret to inform you” … Accompanied by the comments of the reviewers. In some

Hardening binaries (VI) – RELRO

In this post we are going to talk about two options that can happen to the linker to make certain sections of our executable more secure: -Wl, -z, relro, -z, now. When a program calls a function not defined in

Adapting the scam to these times

Since ancient times, scam has been a practice carried out by scammers in order to gain a benefit (usually economic) through deception or social engineering techniques. The number of known campaigns is enormous and, unfortunately, increases as technology media advances.

Categories