top of page
Search
Nickolas Baker
Mar 16, 20233 min read
Malicious eFax Attachments Can Potentially Steal Your Microsoft O365 Password
Phishing attack observed by Polito, Inc., which uses an obfuscated JavaScript attachment to show how to analyze the malicious attack.
Wade Ma
Mar 3, 20209 min read
Automated Obfuscation of Windows Malware and Exploits Using O-LLVM
Today’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with
Mattia Campagnano
Feb 3, 20209 min read
Ransomware Attacks Are on the Rise, Should You Pay the Ransom?
However, sometimes the answer to this question cannot be so clear-cut. Much depends on how valuable the information being held for ransom is
Fred Mastrippolito
Jun 18, 20192 min read
The CISO asked me to run Ransomware on his laptop
The executive’s laptop had the very latest version of a cloud-based, next-generation antivirus endpoint detection and response software, whi
Liana Parakesyan
Feb 21, 20194 min read
Using Intezer Analyze to Reveal Malware Ancestry and Assist IR and Forensic Investigations
Today, much of the malware still operates via the same concept of infecting machines and spreading throughout networks. Due to this, it only
Ian Duffy
Nov 14, 20174 min read
Unpacking script2exe Malware
Script2exe functions by packaging the original VBScript as an encrypted resource within a PE stub. The original script is retained in the EX
Polito, Inc.
Oct 3, 20175 min read
Unwrap Your Malware
*This blog entry was originally published on June 23, 2015 on the original Polito Blog. It was re-posted on October 3, 2017 due to...
Ian Duffy
Jul 5, 20173 min read
AppLocker and Software Restriction Policies
*This blog entry was originally published on July 5, 2017 on the original Polito Blog by Ian Duffy . It was re-posted on October 3, 2017...
Roman Romanenco
Jan 13, 20178 min read
Prepare for Ransomware: Delivery and Defense (Part 3 in a Series on Ransomware)
*This blog entry was originally published on January 13, 2017 on the original Polito Blog by Roman Romanenco . It was re-posted on...
Roman Romanenco
Aug 19, 20165 min read
Deconstructing the Ransomware Kill Chain (Part 2 in a Series on Ransomware)
*This blog entry was originally published on August 19, 2016 on the original Polito Blog by Roman Romanenco . It was re-posted on October...
Roman Romanenco
Jul 18, 20165 min read
The Proliferation of Ransomware (Part 1 in a Series on Ransomware)
*This blog entry was originally published on July 18, 2016 on the original Polito Blog by Roman Romanenco . It was re-posted on October...
Polito, Inc.
Jan 28, 20167 min read
The Simplicity of VBA Malware (Part 2 of 2)
*This blog entry was originally published on January 28, 2016 on the original Polito Blog. It was re-posted on October 3, 2017 due to...
Polito, Inc.
Jan 4, 20165 min read
The Simplicity of VBA Malware (Part 1 of 2)
*This blog entry was originally published on January 4, 2016 on the original Polito Blog. It was re-posted on October 3, 2017 due to...
bottom of page