Deep Analysis of New Poison Ivy/PlugX Variant - Part II

September 15, 2017

This is the second part of the FortiGuard Labs analysis of the new Poison Ivy variant, or PlugX, which was an integrated part of Poison Ivy’s code. In the first part of this analysis we introduced how this malware was installed onto victim’s systems, the techniques it used to perform anti-analysis, how it obtained the C&C server’s IP&Port from the PasteBin website, and how it communicated with its C&C server.

Read more...

Previous Article
How Can SMB Practices Improve Healthcare Cybersecurity?
How Can SMB Practices Improve Healthcare Cybersecurity?

The healthcare sector has been under increasing attack from cybercriminals with a variety of tactics and mo...

Next Article
BlueBorne May Affect Billions of Bluetooth Devices
BlueBorne May Affect Billions of Bluetooth Devices

Bluetooth is one of the most widely deployed and used connectivity protocols in the world. Everything from ...