Actus Sécurité Confirmé 2011 S46

=> Analysis of a malicious PDF from a SEO Sploit Pack . 14/11/2011. «According to a Kaspersky Lab article, SEO Sploit Pack is one of the Exploit Kits which appeared in the first months of the year, being PDF and Java vulnerabilities the most used in these type of kits. That’s the reason why I’ve chosen to analyse a malicious PDF file downloaded from a SEO Sploit Pack (…).»
Source :

=> (Updated) WordPress Timthumb Attacks Rising. 15/11/2011. «SpiderLabs Research Team has been tracking an increase in WordPress Timthumb plug-in scanning. How wide spread are the attacks? We just added the following entry to the Web Hacking Incident Database (WHID) – (…).»
Source :

=> The Mystery of Duqu: Part Five. 15/11/2011. «The driver is the first component of Duqu to be loaded in the system. As we discovered, the driver and other components of malware are installed with a dropper exploiting a 0-day vulnerability (CVE-2011-3402). The driver is registered in the HKLM\System\CurrentControlSet\Services\ registry path. The exact name of the registry key varies in different versions of Duqu drivers (…).»
Source :
Billets en relation :
16/11/2011. Duqu– Threat Research and Analysis by Szor – McAfee Labs [pdf] :

=> TDSS Bootkit Spawns Clones. 15/11/2011. «TDL 4 variants have surfaced recently, making security researchers suspect that the code may have been sold on the black market (…).»
Source :

=> Goodbye DIACAP, Hello DIARMF. 17/11/2011. «Every few months, an elite group of DoD security experts, IT managers, and senior leadership gather to chart the future course for how Information Assurance will be conducted within the Defense Department. Very soon, this group will introduce sweeping changes to the Certification and Accreditation process, to the extent that personnel roles, job titles, and even the moniker C&A itself will change, evolving into new nomenclature and a new era for the Information Assurance community of practice within the DoD. After implementation, the use of DIACAP Certification and Accreditation processes will cease and DIARMF Assessment and Authorization will become the ‘new normal’ for information technology professionals and risk managers throughout the Defense Department (…).»
Source :

=> Another Cousin of Spitmo: SymbOS/ConBot. 18/11/2011. «Analysts on our Threat Research team recently discovered OpFake, a premium rate SMS trojan that shares code with Spitmo. And this week, our automation flagged a new sample. The guys have completed their analysis and it appears that we’ve discovered yet another « cousin » of Spitmo. Only, this trojan doesn’t pretend to be an Opera update (…).»
Source :

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *

Vous pouvez utiliser ces balises et attributs HTML : <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Notifiez-moi les commentaires à venir via email. Vous pouvez aussi vous abonner sans commenter.