it's always nice to see very knowledgeable people shine light on a topic to get rid of some unnecessary fear
@stoff19802 жыл бұрын
Yup always good to see a banking malware author talk about malware and vulns etc
@ko-Daegu2 жыл бұрын
@@stoff1980 didn't fbi kidnapped him and said they didn't until later said it's cuz they are investigating so why not lied once lie again
@itsme75702 жыл бұрын
@@stoff1980 what banking malware did he write?
@eldiablopotato2 жыл бұрын
Thank you for sharing your insights regarding a log4j worm.
@malwareanonymous62822 жыл бұрын
Thanks marcus I always learn new things from you! You are the best!
@atsurao2 жыл бұрын
Great video! Amazing explanation to be able to explain things like these so clearly!
@adamsnetiker10 ай бұрын
Great explanation! I just stumbled upon this and love how you makie it so easy to understand.
@ThePurpleTux2 жыл бұрын
That's actually a really good explanation. Kudos to you
@terranovatech86722 жыл бұрын
Not sure what you are using for noise reduction, but I'd turn it off or toggle it down. It makes your pauses completely silent and it makes it seem choppy. But aside from that, awesome Vid as always! Much love!
@MalwareTechBlog2 жыл бұрын
Dunno, will have to look through my settings to see if I can find what's doing that
@chauh84012 жыл бұрын
marcus is there anything you can't do?!! these vids are brilliant!
@tonybutt28642 жыл бұрын
Thanks, that's helpful. My thinking on this, much of which you already covered, is that the target space is too heterogenous for a worm to be effective, and there are not enough of any particular target to be useful. As well, most vulnerable servers do not use priveleged accounts. Some environments that expose (for instance) a vulnerable Splunk server could then have their internal Splunk servers compromised, which has concerned some security teams. Mostly compromises would ve for 'positional access' - a stepping stone to the rest of the environment. Limiting this is that most vulnerable software should not be running in a privileged account, so local privilege escalation is not a given. That hopefully sets the bar too high for many ransomware access brokers, but not nation states or similar. Perhaps it's plausible that this might be used to wipe logging systems after an event?
@robertandrewww2 жыл бұрын
Great explanation as always Bellerophon
@berndeckenfels2 жыл бұрын
Also lot of the exploits (like the one you analyzed) use a poor exploit chain (class factory which does not work on newer java runtime or does depend on specific gadget chains)
@raghvendramishr2 жыл бұрын
Perfect explanation.
@adambrown39182 жыл бұрын
Great video! Thank you so much. 😀👍
@himashhimash60172 жыл бұрын
Good one .... it is good have you on youtube and active
@amberrose69782 жыл бұрын
When are you guys gonna do another zoom chat? I miss you all. Hope all is well
@alex_lamarche2 жыл бұрын
thanks for the info marcus
@fwiii18312 жыл бұрын
Great video. What do I need to do with my custom exe to bypass most AV softwares possible? I am ready for your instructions :)
@calebbenson72932 жыл бұрын
What a great video! 👍
@atlasfenix69952 жыл бұрын
Awesome informative video!! 👍👍👍
@chauh84012 жыл бұрын
you should look into getting an agent and doing like a netflix show!
@th30c0der32 жыл бұрын
ty are you back to post reverse engineering vids pleas ?
@graemepennell2 жыл бұрын
Unfortunately the human psyche wants to do things because it can, to see its results, not always because it may or may not be effective.
@Versuffe2 жыл бұрын
Thank you. I can make the ultimate worm now!
@nagi6032 жыл бұрын
I would like to upvote, but it's az 69, which describes the video perfectly. :D Great explainer.
@polonia662 жыл бұрын
Thanks
@pauljones91502 жыл бұрын
The thumbnail needs bolder text. Very nice video tho
@pauljones91502 жыл бұрын
And the text shouldn't double the video title.
@liamowen2 жыл бұрын
A vun for the script kiddies, to deface websites like it was the 00s W.O.H style.
@MrHappy-hs6sn2 жыл бұрын
nice
@oa98422 жыл бұрын
the worm doesn't need to be there for the state agencies to take severe mitigation measures, and those measures themselves would cause the problem