Register now for better personalized quote!

HOT NEWS

Threat Spotlight: "A String of Paerls", Part 2, Deep Dive

Jul, 08, 2014 Hi-network.com

This post has been coauthored by Joel Esler, Craig Williams, Richard Harman, Jaeson Schultz, and Douglas Goddard 

In part one of our two part blog series on the "String of Paerls" threat, we showed an attack involving a spearphish message containing an attached malicious Word doc. We also described our methodology in grouping similar samples based on Indicators of Compromise: static and dynamic analysis indicators. In this second part of the blog series we will cover the malicious documents and malicious executables. For the technical deep dive see the write up on the VRT blog here.

 


tag-icon Hot Tags : Security malware TRAC phishing spear phishing VRT

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.
Our company's operations and information are independent of the manufacturers' positions, nor a part of any listed trademarks company.