| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Erika Noerenberg Last year, we discovered a homebrewing website serving malware via fake Adobe Flash updates. I soon found that it was using methods of anti-analysis, and the malicious payloads were all targeting macOS platforms. This talk will introduce the techniques employed by this site and look deeper into a few of the malware samples discovered, discussing commonalities with recent macOS malware. Erika Noerenberg is a Senior Threat Researcher with Carbon Black's Threat Analysis Unit, with over 15 years of experience in the security industry specializing in digital forensics, malware analysis, and software development. Previously, she worked as a malware analyst at LogRhythm Labs and as a forensic analyst and reverse engineer for the Defense Cyber Crime Center (DC3), performing system and malware examinations in support of intrusions investigations for the Department of Defense and FBI.
video
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast