Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Is Slempo/GM-Bot the new standard for mobile malware?

Introduction Slempo/GM-Bot requires little introduction, as it has been the focal point of many recent publications, and is a well known threat in the world of mobile malware. In most cases Slempo/GM-bot presents itself as “Adobe Flash Player... Read more
1 Review

Tinbapore: Millions of Dollars at Risk

Detected by F5 WebSafe security solutions during November 2015, Tinbapore attack has put millions of US dollars at risk. F5 Security experts investigation revealed that Tinbapore is actually a new variant of the good old Tinba Malware that so far... Read more
1 Review

A New Twist on DNS NXDOMAIN DDoS

DDoS attacks are increasing in scale and complexity, threatening to overwhelm the internal resources of businesses around the world. The F5® Silverline® Security Operations Center (SOC) recently saw a new distributed... Read more
1 Review

Yasuo-Bot–the flexible mobile banker targeting Russia and East-Europe

Mobile financial malware needs little introduction, since 2010 mobile malware is on the rise. The first mobile Trojan launched was ‘Zitmo’ (Zeus-In-The-Mobile. A Mobile version of the most common PC Trojan – ZeuS) which was then followed by many... Read more
Average Rating: 4.9
3 Reviews

F5 SOC webinject Analysis

Recently several e-banking Trojans (Dyre, Cridex, and Tinba, for instance) have used script injection techniques to modify the original web page. The modification may enable the attacker to perform money transactions using victims’ credentials.... Read more
1 Review

Domain name holders hit with personalized, malware-laden suspension notices

This according to Zeljka Zorz, HNS Managing Editor from Help Net Security. In his article, Zeljka mention that new email spam campaign has been spotted targeting domain name holders, trying to trick them into downloading malware on their systems.... Read more
1 Review

Slave Malware Analysis

During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two... Read more
1 Review

Slave – IBAN swap, persistency and Zeus-style webinject

Slave is a financial malware written in visual basic. It was first seen around March 2015 and has undergone a significant evolution. Slave conducts its attack by hooking the Internet browser functions and manipulating their code for various... Read more
0 Reviews
Average Rating: 4.9
3 Reviews

Dyre Malware Analysis

Dyre, also known as Dyreza, is a banking Trojan that was first seen around June 2014. With the combination of its ability to steal login credentials by browser hooking and bypassing SSL, its man-in-the-middle (MITM) proxy server, and its Remote... Read more
2 Reviews

Tinba Malware – New, Improved, Persistent

As investigated by Pavel Asinovsky, F5 SOC Malware Researcher, Tinba, also known as “Tinybanker”, “Zusy” and “HµNT€R$”, is a banking Trojan that was first seen in the wild around May 2012. Its source code was leaked in July 2014.... Read more
Average Rating: 4.9
3 Reviews

iBanking Malware Analysis

iBanking is malware that runs on Android mobile devices. It is delivered via a new variant of the computer banking Trojan Qadars, which deceives users into downloading iBanking malware on to their android device. It can be used with any malware... Read more
Average Rating: 4.9
4 Reviews

Nearly 5 million Gmail credentials leaked, really?

This month, almost 5 million Gmail credentials published in a Bitcoin security forum by a Russian hacker. According to RIA Novosty (one of the largest news agencies in Russia), this leak comes just a couple of days after the hackers published at... Read more
1 Review

The man in your browser

#F5SOC #infosec He shouldn't be there you know. The keys to the digital kingdom are credentials. In no industry is this more true (and ultimately more damaging) than financial services. The sophistication of the attacks used to gather those... Read more
0 Reviews

F5 SOC Malware Summary Report: Neverquest

#F5SOC #malware #2FA #infosec The good news is that compromising #2FA requires twice the work. The bad news? Malware can do it. That malware is a serious problem, particularly for organizations that deal with money, is no surprise. Malware is one... Read more
1 Review

Neverquest Malware Analysis

תגים של Technorati:‏ security,websafe,f5socSince the beginning of 2014 F5 SOC Malware investigations resulted in some new methods of Malware attacks operations, mainly in Eastern Europe where the Neverquest Malware was detected. Neverquest, also... Read more
Average Rating: 4.9
3 Reviews

“Anonymous” may attack World Cup 2014 sponsors

As it’s not enough for Brazil 2014 world cup organizers. In addition to the civilians protests against the local government for spending around $11.5 billion on an eight weeks football (soccer) tournament, now the worldwide hacktivists group... Read more
0 Reviews

Malware Analysis Report: Cridex Cross-device Online Banking Trojan

The F5 Security Operation Center In 2013, F5 Networks acquired the security company Versafe, the developer of an online banking anti-fraud solution that fit neatly into F5’s security story. An additional asset gained from the acquisition was the... Read more
0 Reviews