Malware Analysis Tools, Part 2
In the second part of our overview we continue with the selection of the most used and most usable malware analysis tools.
Ladislav Baco is a Senior Security Consultant and Malware Analyst, with more than 10 years of experience in computer security, computer science and education. During his previous employments he worked as the Director of Research and Development at private company and for the Government of EU Country as an analyst in National and Governmental CSIRT Slovakia, with focus on incident response, malware analysis and forensic analysis. Later he also led CSIRT’s Analytical Department and Department of Cyber Threat Analysis.
He also cooperates with multiple Universities in Slovakia on cyber security educational programs for students and consulted on their bachelors and diploma theses.
Moreover, Ladislav participated in many famous cyber security exercises (such as Cyber Europe by Enisa or Locked Shields and Cyber Coalition organized by NATO CCD COE) and has hands-on experience with real APT and targeted attacks.
Currently Ladislav is focused mainly on incident response, threat hunting, cyber threat analysis and malware analysis, which includes his own research of famous malware families as well as APT attacks and new approaches of cyber threat remediation.
In the second part of our overview we continue with the selection of the most used and most usable malware analysis tools.
In this overview we introduce the selection of the most used and most usable malware analysis tools.
In March 2021 our researchers discovered APT campaign targeting Slovakia. We found that this campaign has been active at least since February 2021 and some C&C servers were still active in June 2021.
Attackers compromised up to 1500 companies during massive ransomware attack, which is now reported as one of the largest cyber attacks ever.
DarkSide Ransomware is a very hot topic now, especially after the Compromise of Colonial Pipeline networks, which has been investigated by FBI, too.