ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Guardians of the Galaxy Vol. 2 2017 NEW HDCAM x264 HQMic-CPG
View Torrent Info: Free Fire 2017 HDCAM x264-CPG
View Torrent Info: The.Fate.of.the.Furious.2017.HDTS.H264.AC3.HQ.Hive-CM8
View Torrent Info: The Boss Baby 2017 720p HD-TS x264 AC3-CPG
Hot torrents
XVID DIVX
View Torrent Info: Abbey.Grace.2016.HDRip.XviD.AC3-EVO
View Torrent Info: The Wolfman Legacy - Werewolf of London (1935) Xvid DvDRip [DDR]
View Torrent Info: Dont.Fuck.in.the.Woods.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Small.Crimes.2017.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Small Crimes (2017) NF - 720p WEBRiP - 850MB - ShAaNiG
View Torrent Info: Rogue One (2016) 720p BluRay x264 DTS Soup
View Torrent Info: Sold (2016) x264 DvDRip DDS 5.1 Esub -DDR
View Torrent Info: Voice.from.the.Stone.2017.720p.WEB-DL.H264.AC3-ETRG
Hot torrents
BluRay, 4k UHD
View Torrent Info: The Hunt For Red October 1990 1080p BluRay x264 TrueHD 5.1 -DDR
View Torrent Info: Sniper 1993 1080p BluRay x264 DTSHD 5.1 -DDR
View Torrent Info: Poltergeist 1982 1080p Bluray x264 Multi TrueHD 5.1 -DDR
View Torrent Info: Priest 2011 Multi BluRay 1080p x264 DTSHD 5.1 -DDR
Hot torrents
Television
View Torrent Info: The.Son.S01E05.WEB-DL.x264-FUM[ettv]
View Torrent Info: Training.Day.S01E10.WEB-DL.x264-FUM[ettv]
View Torrent Info: Samurai.Jack.S05E07.HDTV.x264-W4F[ettv]
View Torrent Info: The.Originals.S04E06.WEB-DL.x264-FUM[ettv]
View Torrent Info: Bahubali 2 - The Conclusion 2017 x264 DesiPDVD Rip AAC 2.0 -DDR
View Torrent Info: The Ghazi Attack (2017) - 1080p - BluRay - x264 - DTS - ESub - [DDR]
View Torrent Info: Vaishali (2011) HQ Bluray 1080p x264 DTSHD 5.1 -DDR
View Torrent Info: [ 18] Sechs Schwedinnen auf Ibiza (1981) BDRip 720p x264 [Multi Audio] [German Spanish English]--prisak~~{HKRG}
30s
Chat
To add new messages please Login or Register for FREE
Warning! Protect Yourself from Lawsuits and Fines!
Your IP Address is 54.198.187.30.   Location is United States
Your IP Address is visible to EVERYONE. Hide your IP ADDRESS with a VPN while torrenting!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!
Hide my IP address!


~Security: Targeted Malware for Industrial Espionage?~


Post a Reply    Subscribe to Topic    
AuthorMessage
EMUworld avatar
Posted: Tue Jun 26, 2012 19:25
Author:
A number of sites have published an analysis of relatively new malware, ACAD/Medre.A. While we have had some highly specialized malware in recent years like Stuxnet, which targeted Iranian nuclear facilities, and most modern malware seems to have a data exfiltration component, ACAD/Medre.A is somewhat unique in that it seems to be highly targeted and specialized.

The current version of ACAD/Medre.A seems to be targeted at AutoCAD files hosted at IP addresses in Peru. AutoCAD is popular software used to create blue prints, and hardware and chip designs. Obviously these files are valuable intellectual property for the owning company.

ACAD/Medre.A is not just thrown together, low quality malware. Analysis reveals it is well written; at a level that suggests an experienced malware writer wrote it. Some have speculated that this ACAD/Medre.A was been created by a competitor to target a particular Peruvian company.

My belief is that one of two possibilities are more likely. Either it is a limited test of a new malware concept that will be unleashed on the general world in the future. The malware is written using AutoLISP, the AutoCAD built in scripting language. To the best of my knowledge the first malware written in this language. Another possibility is that it is a targeted intellectual property attack by one of the organized malware groups. This malware exfiltrated data to two email addresses in China; while this may provide a clue, it does not really help in identify the involved group.

Who the actors are and what their intentions are is largely irrelevant to us as security practitioners. This type of attack just reiterates that a large part of securing your organization is not technical, but in understanding what data your company owns and needs to protect. Every organization needs policies and procedures for accurately classifying data. Sounds simple in concept, but most organizations struggle to accurately classify data and maintain classification through the data lifecycle. Only once you have a clear understanding of what your most sensitive data is, and where it is stored, can you design and implement controls to protect that data.


Source: ISC

Post a Reply    

Forum Search


  search in post message
  search in topic subject
Forum


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2017 ExtraTorrent.cc2