top of page
Search


Malicious eFax Attachments Can Potentially Steal Your Microsoft O365 Password
Phishing attack observed by Polito, Inc., which uses an obfuscated JavaScript attachment to show how to analyze the malicious attack.
Nickolas Baker
Mar 16, 20233 min read

Automated Obfuscation of Windows Malware and Exploits Using O-LLVM
Today’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with
Wade Ma
Mar 3, 20209 min read

Ransomware Attacks Are on the Rise, Should You Pay the Ransom?
However, sometimes the answer to this question cannot be so clear-cut. Much depends on how valuable the information being held for ransom is
Mattia Campagnano
Feb 3, 20209 min read

The CISO asked me to run Ransomware on his laptop
The executive’s laptop had the very latest version of a cloud-based, next-generation antivirus endpoint detection and response software, whi
Fred Mastrippolito
Jun 18, 20192 min read

Using Intezer Analyze to Reveal Malware Ancestry and Assist IR and Forensic Investigations
Today, much of the malware still operates via the same concept of infecting machines and spreading throughout networks. Due to this, it only
Liana Parakesyan
Feb 21, 20194 min read


Unpacking script2exe Malware
Script2exe functions by packaging the original VBScript as an encrypted resource within a PE stub. The original script is retained in the EX
Ian Duffy
Nov 14, 20174 min read

Unwrap Your Malware
*This blog entry was originally published on June 23, 2015 on the original Polito Blog. It was re-posted on October 3, 2017 due to...
Polito, Inc.
Oct 3, 20175 min read


AppLocker and Software Restriction Policies
*This blog entry was originally published on July 5, 2017 on the original Polito Blog by Ian Duffy . It was re-posted on October 3, 2017...
Ian Duffy
Jul 5, 20173 min read

Prepare for Ransomware: Delivery and Defense (Part 3 in a Series on Ransomware)
*This blog entry was originally published on January 13, 2017 on the original Polito Blog by Roman Romanenco . It was re-posted on...
Roman Romanenco
Jan 13, 20178 min read

Deconstructing the Ransomware Kill Chain (Part 2 in a Series on Ransomware)
*This blog entry was originally published on August 19, 2016 on the original Polito Blog by Roman Romanenco . It was re-posted on October...
Roman Romanenco
Aug 19, 20165 min read

The Proliferation of Ransomware (Part 1 in a Series on Ransomware)
*This blog entry was originally published on July 18, 2016 on the original Polito Blog by Roman Romanenco . It was re-posted on October...
Roman Romanenco
Jul 18, 20165 min read


The Simplicity of VBA Malware (Part 2 of 2)
*This blog entry was originally published on January 28, 2016 on the original Polito Blog. It was re-posted on October 3, 2017 due to...
Polito, Inc.
Jan 28, 20167 min read


The Simplicity of VBA Malware (Part 1 of 2)
*This blog entry was originally published on January 4, 2016 on the original Polito Blog. It was re-posted on October 3, 2017 due to...
Polito, Inc.
Jan 4, 20165 min read
bottom of page