There is a common annoyance that seems to plague every reverse engineer and incident responder at some point in their career: wasting time or energy looking at junk code.Read more...
Entries filed under 'Code'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
April 22, 2016 11:00 AM By Jonell Baltazar , Joonho Sa | Threat Research, Advanced Malware
The actors behind the Locky ransomware are actively seeking new ways to install their malware on victim computers, and are using a new downloader on the current distribution framework -- which can be a new platform for installing other malware.Read more...
March 22, 2016 8:00 AM By Safwan Khan | Threat Research, Advanced Malware
February 23, 2016 8:00 AM By Abdulellah Alsaheel , Raghav Pande | Threat Research, Advanced Malware
Microsoft's Enhanced Mitigation Experience Toolkit, EMET, adds security mitigations beyond what's built into the operating system, but attackers are sometimes able to bypass it. We discuss how in this blog.