On-Demand Webinar
Now Seculert researchers have discovered new changes that make Dyre more difficult to detect and analyze.
read more
Seculert research discovers that a new version of the financial malware Dyre is avoiding sandbox detection by counting the number of cores.
read more
A new variant of Dyre banking Trojan has emerged with a simple, yet efficient trick that prevents malware researchers from analyzing it.
read more
As more companies deploy sandboxing technology to catch advanced malware, many attackers are adding code to their program to detect if the attack running in a virtual machine.
read more
Researchers have come across a new version of the Dyre banking malware that leverages a clever yet simple technique to evade sandboxes and prevent analysis.
read more
A number of unidentified commercial and freely available sandboxes fail to detect a new version of the Dyre banking Trojan, which was recently blamed for more than $1 million in losses to financial institutions and enterprises. - See more at: https://threatpost.com/dyre-banking-trojan-jumps-out-of-sandbox#sthash.c0CmYihA.dpuf
read more
Researchers have documented a new variant of the Dyreza banking trojan, a member of the Dyre malware family, which has the capability to evade an array of sandbox solutions.
read more
According to Seculert, the new Dyre sample they’ve analyzed is designed to check the number of processor cores on the infected machine. Since most modern PCs have at least two cores, a single core could indicate the presence of a sandbox. That is because sandboxes are usually configured to use only one core in order to save resources.
read moreAn Acquisition is Akin to a Rollercoaster Ride
Feb 15, 2017 9:32:37 PMLet’s Hack an Election, Shall We?
Nov 2, 2016 1:55:28 AMNymaim: Deep Technical Dive - Adventures in Evasive Malware
Oct 11, 2016 3:30:00 PMOn-Demand Webinar
Topics: News & Media, Events
Now Seculert researchers have discovered new changes that make Dyre more difficult to detect and analyze.
Topics: News & Media, In the Media
Seculert research discovers that a new version of the financial malware Dyre is avoiding sandbox detection by counting the number of cores.
Topics: News & Media, In the Media
A new variant of Dyre banking Trojan has emerged with a simple, yet efficient trick that prevents malware researchers from analyzing it.
Topics: News & Media, In the Media
Core checker a defensive wrecker
Topics: News & Media, In the Media
As more companies deploy sandboxing technology to catch advanced malware, many attackers are adding code to their program to detect if the attack running in a virtual machine.
Topics: News & Media, In the Media
Researchers have come across a new version of the Dyre banking malware that leverages a clever yet simple technique to evade sandboxes and prevent analysis.
Topics: News & Media, In the Media
A number of unidentified commercial and freely available sandboxes fail to detect a new version of the Dyre banking Trojan, which was recently blamed for more than $1 million in losses to financial institutions and enterprises. - See more at: https://threatpost.com/dyre-banking-trojan-jumps-out-of-sandbox#sthash.c0CmYihA.dpuf
Topics: News & Media, In the Media
Researchers have documented a new variant of the Dyreza banking trojan, a member of the Dyre malware family, which has the capability to evade an array of sandbox solutions.
Topics: News & Media, In the Media
According to Seculert, the new Dyre sample they’ve analyzed is designed to check the number of processor cores on the infected machine. Since most modern PCs have at least two cores, a single core could indicate the presence of a sandbox. That is because sandboxes are usually configured to use only one core in order to save resources.
Topics: News & Media, In the Media