Creating website backups should be one of the most important recurring tasks for a website administrator, and yet backups are often forgotten when thinking about…
Most malware and spam that we come across has some sort of discernable purpose to it, usually something which benefits the attackers financially. This is…
If you suffer multiple reinfections and your site is one of many in an account, the odds are high that you’re suffering from cross-site contamination.…
During an incident response investigation, we detected an interesting backdoor that was hidden in a fake image. The attacker was quite creative in creating an…
PHP contains an interesting but rarely used feature called Phar, which stands for PHp ARchive, that allows developers to package entire applications as a single…
Phishers usually want to protect their pages from being detected by search engines and security companies. To achieve that, they add .htaccess files that deny…
Social engineering techniques, like phishing, can be powerful in persuading users into performing specific actions or disclosing confidential information. In these types of scenarios, attackers…
Whether it is your own or a website you are visiting, undesired redirects and pop-ups are always annoying. The situation gets worse when your visitors…
When investigating a compromised website, our team has to make sure that all malware and backdoors are cleared from the environment. In some instances, these…
During our malware research role, we analyze hundreds (if not thousands) of malware samples every day. Quite often, highly-obfuscated techniques are used by attackers to…