DMOSK

  • 13 June 2018
  • 0 replies
  • 142 views

Userlevel 7
Badge +36


 
June 8, 2018  By Pierluigi Paganini Security Affairs 

SummaryThe security expert and malware researcher Marco Ramilli published a detailed analysis on a new strain of malware dubbed DMOSK that targets Italian firms. Today I’d like to share another interesting analysis made by my colleagues and I. It would be a nice and interesting analysis since it targeted many Italian and European companies. Fortunately, the attacker forgot the LOG.TXT freely available on the dropping URL letting us know the IP addresses who clicked on the first stage analyzed stage (yes, we know the companies who might be infected). Despite what we did with TaxOlolo we will not disclose the victims IP addresses and so the companies which might be infected. National CERTs have been involved and they’ve got alerted.  Since we believe the threat could radically increase its magnitude in the following hours, we decided to write up this quick dirty analysis focusing on speed rather than on details. So please forgive some quick and undocumented steps.

 
Article Link - Read more
 
  
Glossary Blog Back to the Malware Manifesto

0 replies

Be the first to reply!

Reply