Moker, Part 1: dissecting a new APT under the microscope
Recently, we came across Moker, an advanced malware residing in a sensitive network of a customer. Since the malware did not try to access an external server, but rather tamper with the system inner...
View ArticleMoker, Part 2: Capabilities
A few days ago, we published a blog entry on an advanced malware – Moker, and discussed the different challenges that Moker placed to avoid detection and anti-dissection. Now that we have the stripped...
View ArticleA Technical Breakdown of ModPOS
ModPOS is the latest in the string of POS malware that’s making the news. As its family name implies, this malware is intent on one: stealing credit card information. We decided to research ModPOS...
View ArticleArdBot: A Malware Under Construction
Recently we came across a new sample of the ArdBot malware, appearing on kernelmode, credited to R136a1. A research of this sample showed a malware strain that is not yet ready for production use and...
View Article