Skip to main content

Posts

Showing posts from February, 2019

Flame - Cyber Espionage

                           Flame is the most sophisticated and powerful malicious program that created to target Iranian uranium enrichment process. It creates a backdoor to access a computer on a network and spread via shared files and USB drives. Flame steals data from the affected computer and monitors every activity of the user on the computer. It was 1 st found in Iranian oil network. Flame is considered as another dangerous cyber weapon and used as cyber espionage by attackers. Flame initially spread through a spear phishing email and website. Moreover, it can be spread via infected USB drive and infected PC in LAN. The worm is a 20MB file that contains encryption algorithms, multiple libraries, SQLite3 databases, 20 plugins – provide the platform for attackers and some code written in LUA language which vulnerable to Microsoft Windows computer. When flame infects the computer, all data files w...

DUQU - The RAT

                Duqu is a remote access Trojan (RAT) that contain multiple malicious files which can attacks computers, as a word document. It attacks industrial control equipment manufacturers  (gas, electric and water)  and collects all intelligence information in the compromised computer (ex: user credential, manufacturing details) illegally.  It uses kernel drivers to decrypt and loads encrypted dynamic link library (DLL). These kernel drives act as an injection engine to load DLL. The encrypted files are stored as a .pnf file in the kernel, which is normally set up information file extension in Microsoft Windows system. Since it is remote access Trojan, it will allow the machine to download and run additional programs. Duqu is looking like somewhat Stuxnet worm. Its kernel drives have a digitally signed certificate same as Stuxnet. Consequently, all data can be stole and computer is remotely operated by an a...

Stuxnet - The First Digital Weapon

                    Stuxnet is a file type worm which exploits zero-day vulnerabilities to attack computers. This is considered as the very first digital weapon that not only harms to computers but also the physical aspects which run by computer commands. It especially targets on centrifuges which produce enrich uranium to make nuclear weapons. It was first found as a result of US and Israel project to derail or delay Iran’s process of nuclear weapon manufacture. How does it infect?                The worm is spread by USB drives and it harms to the machine which runs on Microsoft Windows platform. It pretends to seem like reliable by presenting a digital certification and it cannot be identified by a malware detecting tools or security experts. Stuxnet search for the PLC (Programmable logical controller) which is the manufacture of the Siemens. PLC is used...

Tips to secure mobile phones from threats.

Mobile phones are widely using a telecommunication device for information transitory. Even though if you are using mobile phones for personal usage, it can be attacked by most security violations too. Moreover, some threats can be happened with or without our knowledge. Hence our mobile phones similarly should be protected as our computers. So here some tips to block mobile attacks that would be useful to you. Wi-Fi Do not allow your phones to auto connect with unknown Wi-Fi networks connections. Turn off your Wi-Fi connection when are not using it. Do not send sensitive information via Wi-fi, until you know it is secure. Bluetooth Turn off Bluetooth auto pairing Turn off the connection when you do not need.  Apps Never download an app from browser except from your mobile official store (play store/ app store). Do not allow access permission unless you trust it.  Keep them updated to ensure the security of the application.  Take a moment for...

Do we need information security?

  Nowadays Data and information security is the most popular concept. Since technology is developing as a part of our life, Even If you are a technical person or not, we all have to aware of security threats and prevention methods. Have ever think, how valuable our personal information is? Definitely, those are our assets which can be sold for millions and billions.   Everyone has some details regarding them, what they like to share with everybody, or with a particular person or group. Sometimes may not with anyone. So we have all the right to decide what should be private, what should be public and whom we should share with. Consequently, our information should be protected according to our requirement. Is that only thing we have to deliberate about information? Not exactly. Our information not only is with us always. We might have to save it somewhere, which we assume as safe. Sometimes we have to retrieve it from the storage media whenever we need. And we have t...