Sunday, January 5

Applications

Malicious Disk Image Files
Applications, Tutorials

Malicious Disk Image Files

Cyber criminals have been taking advantage of built-in Windows capabilities to mount disk image files once they are opened by the end user. There are multiple disk image file formats, but we have seen ISO and IMG files being abused the most. A disk image is essentially a virtual copy of a physical disk that houses all of the files and requires that it be mounted in order to access its contents. The advantages of using disk images, combined with the easy access to purchasing RATs, make this a preferred and effective method for cyber criminals. In this blog, I dissect a campaign that uses this method to compromise a system, providing insight into what the CrowdStrike FalconComplete team has observed since 2019. I will also provide step-by-step remediation along with recommendations for ho...
Our 2020 Prediction: Automotive Cybersecurity Will Finally Be Regulated
Applications, Malware

Our 2020 Prediction: Automotive Cybersecurity Will Finally Be Regulated

With more and more connected cars on the roads these days, the issue of automotive cybersecurity is increasingly making its way into industrial and governmental awareness as a critical priority. With cybersecurity expected to become a clear requirement for automotive stakeholders in the near future, it’s not surprising that a wave of relevant standards, regulations, rules and best practice guidelines has recently emerged, and is expected to take over the automotive industry in the upcoming months. Existing Automotive Cybersecurity Initiatives Several automotive cybersecurity projects have been established over the past few years with the goal of bringing unison to the penetrable world of connected vehicles. Frameworks such as the Global Auto Alliance’s Framework for Automotive Cybersecur...