Wednesday, August 5, 2015

APT - Hellsing

Hellsing:
STATUS:Active
TYPE:Remote administration tool
DISCOVERY:Summer 2014
TARGETED PLATFORMS:Windows
FIRST KNOWN SAMPLE:2012
NUMBER OF TARGETS:11-100

Top Targeted countries:
Malaysia, Philippines, India, Indonesia, USA

Targets:
Government entities
Diplomatic organizations/embassies

No comments:

How Malware Uses GetThreadContext() to Detect Debuggers – And How to Bypass It?

  Introduction In the world of malware reverse engineering , understanding how malware detects debuggers is crucial. One of the most common ...