Spartacus ransomware: introduction to a strain of unsophisticated malware There is nothing impressive about them, in fact just the opposite. I would say they are boring at best. So why are we writing about one of them? The analysis of Spartacus can essentially be used as a base knowledge and reference for anyone analyzing variants of these basic .NET ransomware that they may come… Read More
This Russian Company Sells Zero-Day Exploits for Hospital Software In one video uploaded to Vimeo, Gleg shows an exploit being used against a hospital health information management system (HHIMS). A list of MedPack updates includes a zero-day to replace files in a piece of software from a company called MediTEX. MediTEX makes scheduling software as well as a platform for documenting therapy and quality… Read More
Home Chip Fabrication in 66 Steps Without further ado, I present the first home(garage)made lithographically-fabricated integrated circuit – the “Z1” PMOS dual differential amplifier chip. I say “lithographically-fabricated” becauseJeri Ellsworth made the first transistors and logic gates (meticulously hand wired with conductive epoxy) andshowedthe world that this is possible. Inspired by her work, I have demonstratedICsmade by a scalable, industry-standard, photolithographic… Read More
Why the F-35 Isn’t Good Enough for Japan While the F-35 retains some radar evading capabilities, its radar cross section is over ten times greater than that of the F-22 making it far less survivable — leading some analysts to term it a “pseudo stealthy”fighter. The F-35 has less than half the range of the larger F-22 and lacks the Raptor’s advanced long… Read More
Three kinds of memory leaks But when we say “memory leak”, what do we actually mean? In my experience, apparent memory leaks divide into three broad categories, each with somewhat different behavior, and requiring distinct tools and approaches to debug. This post aims to describe these classes, and provide tools and techniques for figuring out both which class you’re dealing… Read More
The Pentagon Is Making a Ray Gun to Stop Truck Attacks Law’s crew has dubbed the device the Radio Frequency Vehicle Stopper. They’re working on two versions. A small one, vaguely resembling an old-time phonograph, can fit in the bed of a truck. With a range of 50 meters, it is intended for hot pursuits. To deploy it, the driver would pull out in front of… Read More
Cops take dead man’s smartphone to his corpse in attempt to unlock it The detectives then attempted to use the fingers on Phillip’s body to unlock his own smartphone, which had been recovered from the scene. Their efforts were not successful. Source: arstechnica… Read More
French museum discovers half of its collection are fakes A state-owned French art museum has discovered that more than half of its collection consists of worthless fakes and experts fear that other public galleries may also be stuffed with forgeries. Source: telegraph… Read More
Analysis: Zebrocy used heavily by the Sednit group over last two years The Zebrocy family consists of three components. In the order of deployment these are a Delphi downloader, an AutoIt downloader and a Delphi backdoor. Figure 1 shows the relationship between these components. In this article we describe this family and how it can coexist with the older Seduploader reconnaissance tools. We will talk about some… Read More
People Are Turning Their Instagram Accounts into Bots Verified accounts turning themselves into bots, millions of fake likes and comments, a dirty world of engagement trading inside Telegram groups. Welcome to the secret underbelly of Instagram. Source: buzzfeed… Read More