article thumbnail

Agentless Workload Scanning Gets Supercharged with Malware Scanning

Prisma Clud

Using WildFire in 2021 to analyze malicious files, our threat research team discovered a 73% increase in Cobalt Strike malware samples compared to 2020. The speed, volume and sophistication of modern malware attacks has made them more difficult to detect.

Malware 76
article thumbnail

ELF of the Month: Linux DDoS Malware Sample

Lacework

James CondonDirector of Research, Lacework Labs Each month we take a look at a malicious Executable and Linkable Format (ELF) file, the common executable file format for Unix and Unix-like Operating Systems, and share details about the sample. In this edition of ELF of the Month, we take a look at a Linux DDoS sample […]

Linux 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). General indicators and signatures for steg malware are provided in the hunting section. Steg malware is uncommon relative to other malware. Malware Details.

Malware 96
article thumbnail

Unit 42 Discovers First Known Malware Targeting Windows Containers

Palo Alto Networks

The Unit 42 cybersecurity consulting group published research on the first known malware targeting Windows containers, which was discovered by Unit 42 researcher Daniel Prizmant and named Siloscape. The post Unit 42 Discovers First Known Malware Targeting Windows Containers appeared first on Palo Alto Networks Blog.

Malware 89
article thumbnail

Attacking Supply Chains at the Source

O'Reilly Media - Ideas

A couple of weeks ago, a supply-chain attack against the Linux xz Utils package, which includes the liblzma compression library, was discovered just weeks before the compromised version of the library would have been incorporated into the most widely used Linux distributions. We’ve been very lucky. Is that the end of the story?

Malware 90
article thumbnail

Resolving Embedded Files at Runtime via strace

Lacework

Jared Stroud Cloud Security Researcher, Lacework Labs Modern Linux malware binaries are being shipped with one or more embedded files. Prior to the “real payload” being dropped, it’s common to see checks for the host’s CPU architecture, Linux distribution or […]

Linux 98
article thumbnail

New Lacework report reveals increase in sophisticated cloud attacks

Lacework

They never miss an opportunity to cash in, whether they take advantage of common cloud configuration mistakes, target software supply chains, or adapt malware to evade detection. This malicious update opened up Linux systems to receive and run the open-source cryptocurrency miner, XMRig. Linux Malware and the Cloud.

Report 91