Archive for the ‘Infosec’ Category:

On Cryptocurrency Mining Malware and Electroneum

Down to my last match fire I touch just to feel Why is it easier to burn than it is to heal? The Chainsmokers, XYLO, Setting Fires Note: this article was created 1st week of March 2018 when there was no notable malware family messing with Electroneum (ETN)….yet  While investigating some suspicious activities from one

(Read More…)

On Cryptocurrency Mining Malware

We don’t deal with outsiders very well They say newcomers have a certain smell You have trust issues, not to mention They say they can smell your intentions You’re lovin’ on the freakshow sitting next to you You’ll have some weird people sitting next to you You’ll think “How did I get here, sitting next

(Read More…)

Repost: Cluster of Coins: How Machine Learning Detects Cryptocurrency-mining Malware

Note:  In my previous post, I promised more #tech #infosec #security insights on #Cryptocurrency #Bitcoin #Monero so let me do this repost of my recent collab post. Personal insights to follow soon 🙂 Cluster of Coins: How Machine Learning Detects Cryptocurrency-mining Malware By Jon Oliver and Menard Osena As new trends and developments in the

(Read More…)

Repost: Cryptocurrency-Mining Malware: 2018’s New Menace?

Cryptocurrency-Mining Malware: 2018’s New Menace? by: Menard Osena Will cryptocurrency-mining malware be the new ransomware? The popularity and increasing real-world significance of cryptocurrencies are also drawing cybercriminal attention — so much so that it appears to keep pace with ransomware’s infamy in the threat landscape. In fact, cryptocurrency mining was the most detected network event

(Read More…)

On Salon.com and Cryptocurrency Mining

“When able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near” Sun Tzu, Art of War I came across this article last week: https://www.salon.com/about/faq-what-happens-when-i-choose-to-suppress-ads-on-salon/ <image

(Read More…)

On Capture the Flag

Do you have l33t skills on targeted attacks, Internet of Things (IoT) and Industrial Control Systems (ICS/SCADA) and cybercrime? Interested in having some extra cash (JPY 1,000,000 (approximately US $8,700) or want to have have some fun while learning and building more knowledge in the InfoSec industry?  If yes, then read on… Trend Micro is

(Read More…)

Tags: ,

On SHA1

I posted google’s announcement on the SHA1 Shattering in twitter several weeks ago Bye #SHA1 https://t.co/W3X5RMQhGO https://t.co/BZ4qvT1TZG pic.twitter.com/PlDFrTCCzY — Menard Osena (@Menardconnect) February 24, 2017 And I was surprised that a fellow infosec dude replied and tweeted @Menardconnect a security platform still used MD5. shhhh… — daves espia (@daves_espia) February 24, 2017 and it seems

(Read More…)

Tags:

On Ransomware

“They can beg and they can plead But they can’t see the light Coz the boy with the cold hard cash Is always Mr. Right” Material Girl, Madonna I was planning to write about Ransomware for a long long time but I don’t know where to start. Will I start with the email that my

(Read More…)

Tags:

On Pump and Dump Spam Run

I thought they were an extinct in the wild technological mal-species already. But just yesterday I got this spammy mail via my mailbox: Image 1. Suspicious Email Sorry I choose not comment on the company as I do not have verifiable info on them nr their industry. But I did not subscribe the affected mailbox

(Read More…)

Tags:

On Potentially Unwanted

I have been busy the past few months because of these PUAs (Potentially Unwanted Apps). Honestly I consider myself lucky because yours truly was an old-school AV veteran that survived the good ol’ spyware wars (circa 2003) so connecting the dots for this technical challenge will be considerably an easy task. As I have not

(Read More…)

Tags: ,
© AVSecurityProductManager.com
CyberChimps