<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Malware Analysis</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Malware Analysis</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/malware-analysis/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 19 Sep 2022 00:00:00 -0400</lastBuildDate><item><title>Using Alternate Data Streams in the Collection and Exfiltration of Data</title><link>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, we describe how attackers obscure their activity via alternate data streams (ADSs) and how to defend against malware attacks that employ ADSs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Molly Jaconski</dc:creator><pubDate>Mon, 19 Sep 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Malware Analysis</category><category>Malware</category></item><item><title>Vulnerabilities: Everybody’s Got One!</title><link>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post, Leigh Metcalf describes how she pulled data from the malvuln project to explore recent vulnerabilities in both malware and non-malware to study the differences.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Wed, 16 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Vulnerability Analysis</category><category>Malware Analysis</category><category>Malware</category></item><item><title>Snake Ransomware Analysis Updates</title><link>https://www.sei.cmu.edu/blog/snake-ransomware-analysis-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In January 2020, Sentinel Labs published two reports on Snake (also known as Ekans) ransomware.[1][2] The Snake ransomware gained attention due to its ability to terminate specific industrial control system (ICS) processes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kyle O'Meara</dc:creator><pubDate>Mon, 23 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/snake-ransomware-analysis-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>Path Finding in Malicious Binaries: First in a Series</title><link>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In a previous post, I discussed the Pharos Binary Analysis Framework and tools to support reverse engineering of binaries with a focus on malicious code analysis. Recall that Pharos is....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 10 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category><category>Malware Analysis</category><category>Cyber Missions</category><category>Malware</category></item><item><title>Prioritizing Malware Analysis</title><link>https://www.sei.cmu.edu/blog/prioritizing-malware-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In early 2012, a backdoor Trojan malware named Flame was discovered in the wild. When fully deployed, Flame proved very hard for malware researchers to analyze....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">José Morales</dc:creator><pubDate>Mon, 04 Nov 2013 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-malware-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Malware Analysis</category><category>Malware</category><category>CERT/CC</category></item><item><title>How Ontologies Can Help Build a Science of Cybersecurity</title><link>https://www.sei.cmu.edu/blog/how-ontologies-can-help-build-a-science-of-cybersecurity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore how ontologies can contribute to building a science of cybersecurity in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Mundie, The CERT Insider Threat Center</dc:creator><pubDate>Tue, 12 Mar 2013 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-ontologies-can-help-build-a-science-of-cybersecurity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware Analysis</category><category>Insider Threat</category></item><item><title>Study of Malicious Domain Names: TLD Distribution</title><link>https://www.sei.cmu.edu/blog/study-of-malicious-domain-names-tld-distribution/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Hello, folks. This post comes to you courtesy of Aaron Shelmire from the Network Situational Awareness team....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chad Dougherty</dc:creator><pubDate>Tue, 31 Aug 2010 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/study-of-malicious-domain-names-tld-distribution/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Network Situational Awareness</category><category>Malware Analysis</category><category>CERT/CC</category></item><item><title>Top-10 Top Level and Second Level Domains Found in Malicious Software</title><link>https://www.sei.cmu.edu/blog/top-10-top-level-and-second-level-domains-found-in-malicious-software/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Hello folks. This post comes to you courtesy of Ed Stoner and Aaron Shelmire from the Network Situational Awareness group at CERT....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chad Dougherty</dc:creator><pubDate>Fri, 05 Mar 2010 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/top-10-top-level-and-second-level-domains-found-in-malicious-software/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware Analysis</category><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category></item></channel></rss>