Blog Posts Tagged with "Advanced Evasion Techniques"

03b2ceb73723f8b53cd533e4fba898ee

Remote Forensics Trojans, Surveillance and Investigations

August 07, 2012 Added by:Pierluigi Paganini

Thus the problem of acquisition using RFS tools is that not only is the original source (the computer) not subjected to seizure, it is not in a static environment and can be manipulated. Evidence obtained from an unsecured system can always be subject to a challenge to its authenticity and reliability...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Citadel Trojan Variant Evades Virtual Machine Analysis

June 28, 2012 Added by:Headlines

"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Researchers Uncover 163 New Advanced Evasion Techniques

October 11, 2011 Added by:Headlines

The latest batch of AET's identified by Stonesoft are capable of circumventing the intrusion detections systems that are currently available, and the company warns that the growing number of evasion combinations is leaving network security vendors scrambling for solutions...

Comments  (0)