Blog Posts Tagged with "Advanced Evasion Techniques"


Remote Forensics Trojans, Surveillance and Investigations

August 07, 2012 Added by:Plagiarist Paganini

Thus the problem of acquisition using RFS tools is that not only is the original source (the computer) not subjected to seizure, it is not in a static environment and can be manipulated. Evidence obtained from an unsecured system can always be subject to a challenge to its authenticity and reliability...

Comments  (0)


Citadel Trojan Variant Evades Virtual Machine Analysis

June 28, 2012 Added by:Headlines

"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."

Comments  (1)


Researchers Uncover 163 New Advanced Evasion Techniques

October 11, 2011 Added by:Headlines

The latest batch of AET's identified by Stonesoft are capable of circumventing the intrusion detections systems that are currently available, and the company warns that the growing number of evasion combinations is leaving network security vendors scrambling for solutions...

Comments  (0)