Skip to main content

Questions tagged [malware]

Malware is any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator.

203 questions with no upvoted or accepted answers
6 votes
0 answers
231 views

What security isolation exists between VDI instance to VMware Horizon to ESX?

I read about malware that was able to escape the VM and get to the VMware Horizon host and then to hypervisor ESX, but I am not sure what security controls exist to prevent malware from jumping to ...
Filipon's user avatar
  • 1,294
6 votes
1 answer
349 views

How to find malware added in supply chain to Android phone?

As has become a mainstream news story many times over, some Android phones are being shipped with malware preinstalled, because they go from factory to a second party who adds the malware and then to ...
flane's user avatar
  • 69
4 votes
0 answers
250 views

Process Injection and Process Isolation by OS

If the OS is responsible for ensuring that one process cannot access another process memory space, and the point of process isolation is to keep processes separate from one another, then how can a ...
chephato's user avatar
4 votes
1 answer
658 views

Kinsing Malware entering via compromised Dockerhub Images?

I got a server infected with the Kinsing malware, which mines crypto on your server, maxing out your CPUs. The malware initially creates the files /tmp/kdevtmpfs and /tmp/kinsing If you delete these ...
fccoelho's user avatar
  • 141
4 votes
0 answers
360 views

Comodo Firewall HIPS (Paranoid Mode) Regedits

I've activated Comodo HIPS on "paranoid mode" to firstly see if I have an intrusion via my router but moreover to understand processes that occur. As of recent, I have had a lot of requests ...
N S's user avatar
  • 41
4 votes
2 answers
814 views

Malware techiques via Linux Chrome and its effects, non-root

Is it possible to visit a website with Chrome on Ubuntu and have that site execute shell code on my machine without explicitly downloading anything nor click on some Chrome execute question/popup? If ...
Nathanal Lenner's user avatar
4 votes
1 answer
695 views

Suspicious Skype IP connection

I'm posting this three weeks after a malware and keylogger scare that happened through Skype, and my own negligence, which resulted in a fresh install of Windows 7. Everything's running and clean, ...
Don Amarello's user avatar
3 votes
0 answers
2k views

How does PUA:Win32/InstallCore get on my PC?

I run a full (not quick) scan of Windows Defender every night. Somehow, between two nights ago and last night an instance of PUA:Win32/InstallCore got placed on my PC. Windows Defender removed it, ...
user316117's user avatar
3 votes
0 answers
184 views

First Known Client/Server Architecture Malware

What malware was the first to use a client-server architecture to relay commands? The earliest that I could find appears to be NetBus which was written in early 1998. The next closest would be Back ...
Saustin's user avatar
  • 321
3 votes
1 answer
1k views

Show confirmation popup before running any downloaded program in Windows 10

I often download files either using my browser or by torrenting. Few times, I encountered an attack where the torrented file was called something like movie.mp4.lnk and the target was set to run a ...
a-n's user avatar
  • 61
3 votes
0 answers
201 views

How did Stuxnet prevent the user from seeing the malicious files on a USB stick?

From what I can tell there were two main TMP files present on the infected USB stick. The smaller of the two would run first and hook various functions related to viewing files so as to hide the LNK ...
user avatar
3 votes
1 answer
2k views

Potential router malware? Receiving "Access Denied" and other weird blocks from various websites

So I've been having some weird browsing behavior over the last few weeks and it's gotten a lot worse the last few days. I've been getting blocked/banned by various websites off and on. Here are a few ...
Jeff's user avatar
  • 131
3 votes
0 answers
146 views

Search function in Outlook and attachements

I am wondering how the search function of Outlook is working, especially in regards to researching key words that are presents in emails attachements. Does the Outlook search function opens the files ...
404guest's user avatar
3 votes
0 answers
125 views

What caused these massive spikes in malware sites detected by Google in July 2012 and January-February 2014?

Google's Transparency Report shows pretty huge spikes in malware sites detected by crawlers in July 2012 and in January/February 2014. I can't find any record of what these spikes were caused by ...
Rob Rose's user avatar
  • 225
3 votes
0 answers
229 views

Need Security advice on virtualization and windows security

I have a little doubt about the security of my virtual machine and Windows. Can anyone please point me in right direction? Below is my what, how and why I made my virtual machine. Let me tell you what ...
user3526312's user avatar

15 30 50 per page
1
2 3 4 5
14