All posts from Hynek Blinka

Latest articles

Loading
Shares

Turla Rootkit: A Look Under the Hood

Author: Jakub Kroustek In this analysis, we focus on a recently discovered cyber-espionage threat named Turla that is…

by
June 9, 2014 in News + Threats
Loading
Shares

Malware Analysis: Cryptocurrency-mining Malware Running on DVRs

Authors: Jakub Kroustek and Peter Matula Recently, Johannes Ullrich from SANS Technology Institute reported a successful malware attack…

by
April 23, 2014 in News + Threats
Loading
Shares

AutoIt approach: Infecting your browser via code recycling

Author: Jakub Kroustek In this article, we focus on analysis of a 32-bit WinPE sample with MD5 sum…

by
March 26, 2014 in News + Threats
Loading
Shares

Linux.Aidra vs Linux.Darlloz: War of the Worms

Authors: Lukáš Ďurfina, Jakub Křoustek, Peter Matula, Petr Zemek   At the end of 2013, a new worm…

by
February 20, 2014 in News + Threats
Loading
Shares

Keep your Bitcoins safe and avoid these passwords!

Digital currency, mainly in the form of Bitcoin, is quickly gaining popularity these days and it is no…

by
December 20, 2013 in News + Threats
Loading
Shares

New JS/HiddenLink Script detected

A recently detected a new script as JS/HiddenLink – but is it a false positive? Unfortunately not, this…

by
September 19, 2013 in News + Threats
Loading
Shares

Fake MMS spam spreading Zeus bot … now in Czech Republic

From time to time, we register higher than usual volumes of malicious spam emails being spread in certain…

by
June 5, 2013 in News + Threats
Zbot family runs on selected systems only
Loading
Shares

Zbot family runs on selected systems only

It is pretty usual when you try to analyze some malware that does not run in virtual machine…

by
April 12, 2013 in News + Threats