Malware Analysis


SUBMITTED BY: sush1212

DATE: Dec. 1, 2016, 1:49 a.m.

FORMAT: Text only

SIZE: 1.3 kB

HITS: 2936

  1. The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’
  2. sensitive information is being stolen from your network. You begin your investigation by checking
  3. your logs to identify the hosts involved. You scan the hosts with antivirus software to find the
  4. malicious program, and catch a lucky break when it detects a trojan horse named TROJ.snapAK. You
  5. delete the file in an attempt to clean things up, and you use network capture to create an intrusion
  6. detection system (IDS) signature to make sure no other machines are infected. Then you patch the hole
  7. that you think the attackers used to break in to ensure that it doesn’t happen again.
  8. Then, several days later, the networking guys are back, telling you that sensitive data is being stolen
  9. from your network. It seems like the same attack, but you have no idea what to do. Clearly, your IDS
  10. signature failed, because more machines are infected, and your antivirus software isn’t providing
  11. enough protection to isolate the threat. Now upper management demands an explanation of what
  12. happened, and all you can tell them about the malware is that it was TROJ.snapAK. You don’t have
  13. the answers to the most important questions, and you’re looking kind of lame.

comments powered by Disqus