Questions tagged [malware]
Malware is any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator.
2,550
questions
1
vote
1
answer
72
views
How to update BIOS before BIOS infected Host reinfects BIOS?
I learned about the BIOS being able to be written to by malware. It reminded me I have a used laptop that performs noticeably slower than any comparable devices, so I went ahead an downloaded BIOS ...
1
vote
0
answers
44
views
GPU Firmware Infections through AUTOMATIC1111 (StableDiffuision)?
I would like to ask a question about a strange incident that occurred as a result of using the StableDiffusion tool AUTOMATIC1111 (https://github.com/AUTOMATIC1111/).
Here's what happened: I used the ...
0
votes
0
answers
47
views
Canary Token (from canarytokens.org) still getting triggered despite reinstalling Windows? [closed]
I installed the token months ago, have since wiped my drive and reinstalled windows, but I still get email notifications saying my token is triggered?
THe token in question is called a FAST URL ...
1
vote
0
answers
29
views
what snort rules can detect covert channels?
I'm new to snort. I'm trying to set up rules in snort to detect the presence of covert timing channels. Ideally, I would like to use pre-made rules like the snort community rules.
So far, I've found ...
1
vote
0
answers
94
views
Can anyone decipher this .BAT malware? [closed]
Its a 3.37MB batch file. When opened in Notepad/++ it's all Chinese and some unknown characters. It's still remaining largely undetectable despite being launched in the wild more than 2 days ago, ...
1
vote
0
answers
45
views
Jump-Oriented Programming: Why is it better/easier to jump to the dispatcher gadget than to jump from one functional gadget directly to another?
Jump-oriented Programming: Why is it better/easier to jump to the dispatcher gadget than to jump from one functional gadget directly to another functional gadget?
My understanding of JOP:
In jump-...
0
votes
0
answers
23
views
Jump-Oriented Programming: Harder than ROP because the registers need to be prepared individually? + Turing complete, but large overhead/slow?
Full title: Jump-Oriented Programming: Is it harder than traditional return-oriented programming because you need to manually prepare all the addresses and registers or is there a different reason?
...
0
votes
0
answers
57
views
How to harden VMware for malware analysis? [duplicate]
I’m looking for answers specific to VMware Workstation Pro 17.5.2. in 2024, not answers about other VM softwares.
On Windows 11, how can I harden a VM in VMware Workstation Pro 17.5.2 so that malware ...
0
votes
0
answers
9
views
Can signing into a compromised account on a new device infect the new device? [duplicate]
Can signing into a gmail account that was compromised/hacked infect a new device? (Account was compromised on one device, and a new device is used to sign in).
What about for other accounts, like ...
2
votes
1
answer
77
views
What are the infection risks for a SMB/Samba file share from an infected client PC?
I have a PC on my home network that I consider potentially infected by exposure to an untrusted program from the internet. (Antivirus detected nothing, and the PC runs fine, but I'm choosing to err on ...
26
votes
4
answers
8k
views
How long does malware last "in the wild"?
I watched this YouTube video where the uploader connected a Windows 2000 virtual machine directly to the internet, no NAT or firewall.
Within minutes, his VM is infected with malware, the overwhelming ...
1
vote
2
answers
115
views
Backdoor:PHP/Webshell.O virus detected in an uploaded image file. Should I be worried? How can I prevent it?
I have a site which allows users to upload images. One uploaded file was recently detected by antivirus software (uploads aren't scanned, this was a system wide scan after)
Upon upload, I check the ...
0
votes
1
answer
141
views
Can a USB stick be made to automatically hack a system?
I am a cybersecurity professional who is interested in researching the field of injectables.
Does a device exist, or can be made, that if plugged into a computer would instantly start attacking the ...
1
vote
3
answers
210
views
Can my phone got infected if visit my mail inbox without opening any mail attachments?
I've found some articles saying some viruses/malware can attack your device by just opening an email without downloading or opening any attachments.
Is this true?
If yes, how risky for ordinary mail ...
0
votes
1
answer
116
views
Why Ransomware generate keypair in victim?
I read this answer Ransomware encryption keys and understood how wannacry works. But I still have a question: as I understand, the hacker will put the hacker's RSA public key in the malware, the ...