Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • Modasiya
    Modasiya at July 28,2016
    A fair analysis.The virus didn't took much and was not so sophisticated to be carried out but affected many large enterprises. In near future USB drives would be disabled from most the the critical enterprises which I suppose is already being followed. Malware target of wiping the MBR and thereby making a huge damage to the system was intresting.
  • kbacon5
    kbacon5 at September 23,2016
    That was a very interesting video about the Shamoon virus. I read that Saudi Aramco had invested a lot to secure the industrial control systems but the attackers hurt the company by targeting desktops and Windows systems. In the video they point out that it was an insider threat and it seems like it would be very hard to attack successfully without someone on the inside for this virus. This is a good example of how the people in the organization can be the weakest link.
  • dbegum
    dbegum at September 23,2016
    The analysis of the Shamoon virus was good but I didn’t quite understand how it was done. It’s definitely required a lot of process before it was able to in fact 30,000 pcs. And what I didn’t understand was that, it seem like it was an attack on Saudi’s system but then why place burning American Flag on the share. I guess some work doesn’t have explanation. The insight from JSahm151 was pretty good not knowing the danger of deleting the MBR. Definitely, an interesting video.
  • BBurgess
    BBurgess at October 07,2016
    This video makes me look forward to taking the reverse engineering course. The Shamoon virus, although designed in a less sophisticated way, is still very interesting to dissect. To me building the profile of the creators/originators is very interesting. Dissecting Shamoon revealed many things that lend a hand into identifying where this malware came from. Certain paths and lingo was identified, that was similar to other malware in existence and the wipe functionality of the malware replaced similar files with the .jpeg containing a image of a burning US flag. Then lastly the RawDisk software that was used to wipe the MBR, showed that the creator was not advanced enough to create their own MBR wiper. With that said it is important to point out how much damage this "less sophisticated" attack has done on this company in particular. It would be interesting to dissect this malware myself and see first hand how it was designed.
  • michealb40
    michealb40 at November 10,2016
    Such a simple attack. That simplicity was what makes it so difficult to point at the correct attacker. The low tech stuff is the hardest to spot sometimes.
    • «
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved