Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. "Have you noticed that those deep-dive stories about complex Windows malware have pretty much vanished, especially in recent years?

"Have you noticed that those deep-dive stories about complex Windows malware have pretty much vanished, especially in recent years?

Scheduled Pinned Locked Moved Uncategorized
8 Posts 6 Posters 15 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • swiftonsecurity@infosec.exchangeS This user is from outside of this forum
    swiftonsecurity@infosec.exchangeS This user is from outside of this forum
    swiftonsecurity@infosec.exchange
    wrote last edited by
    #1

    "Have you noticed that those deep-dive stories about complex Windows malware have pretty much vanished, especially in recent years? It feels like the era of "blockbuster" Windows malware has just gone silent, and this blog post tries to give some answers why"
    By R136a1 / @TheEnergyStory on X

    Link Preview Image
    Where Have All the Complex Windows Malware and Their Analyses Gone?

    You might have also wondered why, especially over the last few years, it has become increasingly rare to read about truly interesting malware and its in-depth analysis. If you’ve been in cybersecurity for more than a decade, you remember the feeling of a true discovery. You’d wake up, grab a coffee, and check the latest from the Kaspersky GReAT team, or other sources like the FireEye (now Mandiant/Google) or the ESET blogs, only to find a sixty-page PDF that read like a high-stakes espionage thriller. One to two decades ago, corporate security blogs, independent researcher sites, and specialized forums like KernelMode.info were an absolute goldmine for malware blockbusters. It wasn’t just the detailed technical teardowns of highly complex, custom-built rootkis that captivated us; it was the thrill of the hunt itself. Threat hunters and malware researchers would publish gripping, step-by-step accounts of how they tracked digital breadcrumbs across obscure infrastructure, pivoting through servers and protocols until they finally uncovered sprawling, modular toolkits complete with intricate custom plugins.

    favicon

    R136a1 (r136a1.dev)

    fuchsiii@oxytodon.comF chuckpebble@c.imC nrmacdonald@mastodon.socialN nosirrahsec@infosec.exchangeN mttaggart@infosec.exchangeM 5 Replies Last reply
    1
    0
    • swiftonsecurity@infosec.exchangeS swiftonsecurity@infosec.exchange

      "Have you noticed that those deep-dive stories about complex Windows malware have pretty much vanished, especially in recent years? It feels like the era of "blockbuster" Windows malware has just gone silent, and this blog post tries to give some answers why"
      By R136a1 / @TheEnergyStory on X

      Link Preview Image
      Where Have All the Complex Windows Malware and Their Analyses Gone?

      You might have also wondered why, especially over the last few years, it has become increasingly rare to read about truly interesting malware and its in-depth analysis. If you’ve been in cybersecurity for more than a decade, you remember the feeling of a true discovery. You’d wake up, grab a coffee, and check the latest from the Kaspersky GReAT team, or other sources like the FireEye (now Mandiant/Google) or the ESET blogs, only to find a sixty-page PDF that read like a high-stakes espionage thriller. One to two decades ago, corporate security blogs, independent researcher sites, and specialized forums like KernelMode.info were an absolute goldmine for malware blockbusters. It wasn’t just the detailed technical teardowns of highly complex, custom-built rootkis that captivated us; it was the thrill of the hunt itself. Threat hunters and malware researchers would publish gripping, step-by-step accounts of how they tracked digital breadcrumbs across obscure infrastructure, pivoting through servers and protocols until they finally uncovered sprawling, modular toolkits complete with intricate custom plugins.

      favicon

      R136a1 (r136a1.dev)

      fuchsiii@oxytodon.comF This user is from outside of this forum
      fuchsiii@oxytodon.comF This user is from outside of this forum
      fuchsiii@oxytodon.com
      wrote last edited by
      #2

      @SwiftOnSecurity Yes, I wake up every morning and tell myself "A new Stuxnet is exactly what the world needs right now".

      fuchsiii@oxytodon.comF 1 Reply Last reply
      0
      • fuchsiii@oxytodon.comF fuchsiii@oxytodon.com

        @SwiftOnSecurity Yes, I wake up every morning and tell myself "A new Stuxnet is exactly what the world needs right now".

        fuchsiii@oxytodon.comF This user is from outside of this forum
        fuchsiii@oxytodon.comF This user is from outside of this forum
        fuchsiii@oxytodon.com
        wrote last edited by
        #3

        @SwiftOnSecurity (unironically)

        1 Reply Last reply
        0
        • swiftonsecurity@infosec.exchangeS swiftonsecurity@infosec.exchange

          "Have you noticed that those deep-dive stories about complex Windows malware have pretty much vanished, especially in recent years? It feels like the era of "blockbuster" Windows malware has just gone silent, and this blog post tries to give some answers why"
          By R136a1 / @TheEnergyStory on X

          Link Preview Image
          Where Have All the Complex Windows Malware and Their Analyses Gone?

          You might have also wondered why, especially over the last few years, it has become increasingly rare to read about truly interesting malware and its in-depth analysis. If you’ve been in cybersecurity for more than a decade, you remember the feeling of a true discovery. You’d wake up, grab a coffee, and check the latest from the Kaspersky GReAT team, or other sources like the FireEye (now Mandiant/Google) or the ESET blogs, only to find a sixty-page PDF that read like a high-stakes espionage thriller. One to two decades ago, corporate security blogs, independent researcher sites, and specialized forums like KernelMode.info were an absolute goldmine for malware blockbusters. It wasn’t just the detailed technical teardowns of highly complex, custom-built rootkis that captivated us; it was the thrill of the hunt itself. Threat hunters and malware researchers would publish gripping, step-by-step accounts of how they tracked digital breadcrumbs across obscure infrastructure, pivoting through servers and protocols until they finally uncovered sprawling, modular toolkits complete with intricate custom plugins.

          favicon

          R136a1 (r136a1.dev)

          chuckpebble@c.imC This user is from outside of this forum
          chuckpebble@c.imC This user is from outside of this forum
          chuckpebble@c.im
          wrote last edited by
          #4

          @SwiftOnSecurity reads title to the tune of “Where Have All The Cowboys Gone”

          1 Reply Last reply
          0
          • swiftonsecurity@infosec.exchangeS swiftonsecurity@infosec.exchange

            "Have you noticed that those deep-dive stories about complex Windows malware have pretty much vanished, especially in recent years? It feels like the era of "blockbuster" Windows malware has just gone silent, and this blog post tries to give some answers why"
            By R136a1 / @TheEnergyStory on X

            Link Preview Image
            Where Have All the Complex Windows Malware and Their Analyses Gone?

            You might have also wondered why, especially over the last few years, it has become increasingly rare to read about truly interesting malware and its in-depth analysis. If you’ve been in cybersecurity for more than a decade, you remember the feeling of a true discovery. You’d wake up, grab a coffee, and check the latest from the Kaspersky GReAT team, or other sources like the FireEye (now Mandiant/Google) or the ESET blogs, only to find a sixty-page PDF that read like a high-stakes espionage thriller. One to two decades ago, corporate security blogs, independent researcher sites, and specialized forums like KernelMode.info were an absolute goldmine for malware blockbusters. It wasn’t just the detailed technical teardowns of highly complex, custom-built rootkis that captivated us; it was the thrill of the hunt itself. Threat hunters and malware researchers would publish gripping, step-by-step accounts of how they tracked digital breadcrumbs across obscure infrastructure, pivoting through servers and protocols until they finally uncovered sprawling, modular toolkits complete with intricate custom plugins.

            favicon

            R136a1 (r136a1.dev)

            nrmacdonald@mastodon.socialN This user is from outside of this forum
            nrmacdonald@mastodon.socialN This user is from outside of this forum
            nrmacdonald@mastodon.social
            wrote last edited by
            #5

            @SwiftOnSecurity
            This is because Windows itself is malware and the additions are just third party extensions expanding the theme.

            1 Reply Last reply
            0
            • swiftonsecurity@infosec.exchangeS swiftonsecurity@infosec.exchange

              "Have you noticed that those deep-dive stories about complex Windows malware have pretty much vanished, especially in recent years? It feels like the era of "blockbuster" Windows malware has just gone silent, and this blog post tries to give some answers why"
              By R136a1 / @TheEnergyStory on X

              Link Preview Image
              Where Have All the Complex Windows Malware and Their Analyses Gone?

              You might have also wondered why, especially over the last few years, it has become increasingly rare to read about truly interesting malware and its in-depth analysis. If you’ve been in cybersecurity for more than a decade, you remember the feeling of a true discovery. You’d wake up, grab a coffee, and check the latest from the Kaspersky GReAT team, or other sources like the FireEye (now Mandiant/Google) or the ESET blogs, only to find a sixty-page PDF that read like a high-stakes espionage thriller. One to two decades ago, corporate security blogs, independent researcher sites, and specialized forums like KernelMode.info were an absolute goldmine for malware blockbusters. It wasn’t just the detailed technical teardowns of highly complex, custom-built rootkis that captivated us; it was the thrill of the hunt itself. Threat hunters and malware researchers would publish gripping, step-by-step accounts of how they tracked digital breadcrumbs across obscure infrastructure, pivoting through servers and protocols until they finally uncovered sprawling, modular toolkits complete with intricate custom plugins.

              favicon

              R136a1 (r136a1.dev)

              nosirrahsec@infosec.exchangeN This user is from outside of this forum
              nosirrahsec@infosec.exchangeN This user is from outside of this forum
              nosirrahsec@infosec.exchange
              wrote last edited by
              #6

              @SwiftOnSecurity This is a good fucking read. (still working on it lol)

              1 Reply Last reply
              0
              • mttaggart@infosec.exchangeM mttaggart@infosec.exchange shared this topic
              • swiftonsecurity@infosec.exchangeS swiftonsecurity@infosec.exchange

                "Have you noticed that those deep-dive stories about complex Windows malware have pretty much vanished, especially in recent years? It feels like the era of "blockbuster" Windows malware has just gone silent, and this blog post tries to give some answers why"
                By R136a1 / @TheEnergyStory on X

                Link Preview Image
                Where Have All the Complex Windows Malware and Their Analyses Gone?

                You might have also wondered why, especially over the last few years, it has become increasingly rare to read about truly interesting malware and its in-depth analysis. If you’ve been in cybersecurity for more than a decade, you remember the feeling of a true discovery. You’d wake up, grab a coffee, and check the latest from the Kaspersky GReAT team, or other sources like the FireEye (now Mandiant/Google) or the ESET blogs, only to find a sixty-page PDF that read like a high-stakes espionage thriller. One to two decades ago, corporate security blogs, independent researcher sites, and specialized forums like KernelMode.info were an absolute goldmine for malware blockbusters. It wasn’t just the detailed technical teardowns of highly complex, custom-built rootkis that captivated us; it was the thrill of the hunt itself. Threat hunters and malware researchers would publish gripping, step-by-step accounts of how they tracked digital breadcrumbs across obscure infrastructure, pivoting through servers and protocols until they finally uncovered sprawling, modular toolkits complete with intricate custom plugins.

                favicon

                R136a1 (r136a1.dev)

                mttaggart@infosec.exchangeM This user is from outside of this forum
                mttaggart@infosec.exchangeM This user is from outside of this forum
                mttaggart@infosec.exchange
                wrote last edited by
                #7

                @SwiftOnSecurity The "Threat Intel Paywall" is one of the primary reasons we founded @ifin. We're bringing back the old ways—including the in-depth research.

                swiftonsecurity@infosec.exchangeS 1 Reply Last reply
                0
                • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                  @SwiftOnSecurity The "Threat Intel Paywall" is one of the primary reasons we founded @ifin. We're bringing back the old ways—including the in-depth research.

                  swiftonsecurity@infosec.exchangeS This user is from outside of this forum
                  swiftonsecurity@infosec.exchangeS This user is from outside of this forum
                  swiftonsecurity@infosec.exchange
                  wrote last edited by
                  #8

                  @mttaggart 👀

                  1 Reply Last reply
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups