ethereum

A scan of almost one million Ethereum smart-contracts has found 34,100 vulnerable contracts that could be exploited to steal Ether. It could even freeze/delete assets in certain contracts the hackers do not own. For the typical user not familiar with the world of cryptocurrencies these smart contracts are a set of codedRead More →

cryptomining

To maximize their profits hackers are leveraging the computer power of as many devices as they possibly can. However, they must find ways to deliver the malicious crypto-miners on a large enough scale for it to be profitable. While the infamous Wannacry ransomware was publicized for taking advantage of theRead More →

Technology

DriverBuddy is an IDAPython plugin that automates some of the struggle surrounding the reverse engineering of Windows kernel drivers. DriverBuddy Installation Instructions: Create a clone of the repo: git clone https://github.com/nccgroup/DriverBuddy.git Make a copy of the DriverBuddy folder as well as the DriverBuddy.py file into the IDA plugins folder: C:\Program Files (x86)\IDA 6.8\plugins orRead More →

RansomeWare

Cybercrime is very much a psychological game and ransomware is no exception. Psychology plays a major role in nearly all aspects of ransomware from the instant an attack is launched, to the moment the victim pays—or sometimes refuses to pay—said ransom. The Psychology of Ransomware Distribution Ransomware is mainly distributed through instant messages,Read More →