
Dumping COVID-19.jar with Java Instrumentation
There is a generic and easy way to unpack Java malware that is not well-known yet. For demonstration I use a recent JAR malware sample that jumps on the COVID-19 bandwagon.
Dumping COVID-19.jar with Java Instrumentation
There is a generic and easy way to unpack Java malware that is not well-known yet. For demonstration I use a recent JAR malware sample that jumps on the COVID-19 bandwagon.
PE trick explained: Telling 32 and 64 bit apart with naked eye
There is a simple trick to see the bitness of a Portable Executable file immediately by looking into a hex editor. But why does it even work? And is it reliable?
Switching providers made easy - dispelling preconceptions by talking to presales
A company is no longer satisfied with its current IT security solution. And yet they shy away from switching providers. But doing so is easier than they think. The Presales Consultants at G DATA CyberDefense have the right answers to the questions niggling IT managers and will develop a suitable…
Presenting a Graph-based User Interface for Malware Analysis at the Global Graph Summit
End of January 2020, the Global Graph Summit took place in Austin TX, USA. The summit is the biggest conference in the world with a focus on graph computation and graph-related technologies. Stefan Hausotte from G DATA presented the work of his team for the second time at the Global Graph Summit.…
Password rules: Changing passwords regularly damages security
There’s a saying that you should treat passwords like your underwear - change them regularly and don't share them with others. However, opposition to this has been building for some time now. Changing passwords regularly doesn't improve security - quite the opposite.
Mobile Security - this path will not be easy...
Updates are essential for the security of Android devices. However, given the different operating system versions, it is difficult to keep track. We shed light on the version labyrinth and provide tips to improve security.
Mobile Security - it could be this easy...
The situation with security for smartphones using the Android operating system is improving - albeit very slowly. A major reason for this is the large variety of versions used. In a two-part series, we highlight the current problems and give tips on how to improve the security of the devices.
Germans dispense with security for their smartphones on holiday
G DATA survey shows that Germans are not so strict about IT security when on holiday. 43 per cent take no action regarding security for their mobile device before going away. This means no installation of security software and no password request activation. This makes life easy for local digital…
Malware Naming Hell Part 1: Taming the mess of AV detection names
Everyone who deals with malware will know this: Malware names are a convoluted mess. AV scanners will show different detection names for the same file. This confusion is also reflected in media coverage. Is there a way out of this mess?
A deeper dive into the"Silentbruter" malware - Internal folder structures revealed
A malware called "SilentBruter", which is designed to guess login credentials for online accounts, has caught the attention of one of our analysts. In this blogpost we take a closer look at the Silentbruter-Malware and its rather interesting internal structures.