Creating malicous PDF files

Monday, June 2nd, 2008

Yesterday's post discussed a mystery PDF file that was boopytrapped to drop a backdoor. Today we'll look at how these documents are created. Here's an example of a tool called Y08-04 aka GenMDB. When run, it displays this user interface: The apparent purpose of this tool is to create trojanized PDF files. You select ...

Free Sysinternals Windows utilities now available online, 24/7

Wednesday, May 28th, 2008

If you troubleshoot Windows PCs for fun or profit, then chances are you’ve used one or more tools from Sysinternals. Microsoft bought the company and its amazing library of diagnostic, troubleshooting, and management utilities in 2006, and the collection has been continually updated ever since. It’s also still completely free. A few weeks ...

Less is more (secure)

Wednesday, May 28th, 2008

Complexity is the enemy of security. Simple systems are inherently more secure than complex solutions. We see this idea validated again and again in security. Unfortunately, our IT systems are getting more and more complex as we depend on technology to fuel business growth and innovation. But do we really need ...

Tomorrow’s Malware

Tuesday, May 20th, 2008

My favorite tech quote is from Giorgio Maone. It goes like this: If today’s malware mostly runs on Windows because it’s the commonest executable platform, tomorrow’s will likely run on the Web, for the very same reason. Because, like it or not, Web is already a huge executable platform, and ...

Music Unleashes the Malware Beast

Monday, May 12th, 2008

This definitely won’t be music to the ears of music aficionados who acquire their MP3s from peer-to-peer (P2P) networks, but it’s definitely not something they haven’t heard of either. A host of adware under the guise of media files on P2P networks have been reportedly raking up numbers of victims on ...