Articles by Donato Ferrante

Anatomy of a Symbian Malware

Anatomy of a Symbian Malware

Yesterday, I found a sample of Symbian malware while I was working on generic stuff. This kind of malware is quite difficult to spot, so today we are going to analyze this sample, which targets Symbian based smartphones. This malware Read more…

I think therefore I change

I think therefore I change

Some malware authors tend to be tricky to break detections based on static signature matching. So they scramble the malware code in a way that they consider to be useful to save the malware from being detected. So here we Read more…

CVE 2010-1885 exploited in the wild

CVE 2010-1885 exploited in the wild

The recent Microsoft Windows Help and Support Center vulnerability (CVE 2010-1885) is being exploited in the wild. Today, we got the first pro-active detection (Sus/HcpExpl-A) on malware that is spreading via a compromised website. This malware downloads and executes an Read more…