logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • GitHub Breach – Hackers Stole Code Signing Certificates From Repositories
  • Misconfiguration and vulnerabilities biggest risks in cloud security: Report
  • Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
  • Coalition Forecasts CVE Disclosure Spike in 2023
  • CVE-2023-23924: Critical-Severity RCE Flaw Found in Popular Dompdf Library

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2020-22452 (phpmyadmin) 26 January 2023
  • CVE-2020-22327 (hfish) 26 January 2023
  • CVE-2020-36655 (gii) 21 January 2023
  • CVE-2020-25502 (endpoint_detection_and_response) 20 January 2023
  • CVE-2020-23256 (electerm) 20 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

zLoader XLM Update: Macro code and behavior change

Posted on 22 September 2020

From malware.news

Central Loop Mechanism

The decoding part of the central loop mechanism still exists as it did before. It grabs hex characters from elsewhere in the document, decodes them, and writes those strings to new cells. However in this case, the document only runs through two rounds of this decoding.

Read more…

Posted in News

Post navigation

Previous post: Dive Deeper — Analyze real mode binaries like a Pro with Qiling Framework
Next post: State in India Leaves Data From Covid-19 Surveillance Tool Open, Risking Safety for Millions of People Across the Country
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.