Assalamualaikum and salam sejahtera,

A lot can be learn from reading this article.

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1

1) Compromise servers are use by trojan to get "payload" to execute
needed applications (download) or "phone home" to report or upload
data that's the trojan target to compromise.

" They determined that each time Stuxnet infected a system, it “phoned
home” to one of two domains — www.mypremierfutbol.com and
www.todaysfutbol.com hosted on servers in Malaysia and Denmark — to
report information about the infected machines. "

2) Increase attack thats stealth and hook into behind operating system
logic that's could not be detect by anti virus. And the target goal
getting bolder.

" Things changed as e-commerce took hold, and hackers began to focus
on financial gain for their payloads — stealing credit card data,
online banking credentials and corporate secrets. More recently,
attacks have evolved to so-called advanced persistent threats — where
attackers, some state-sponsored, patiently worked their way deep into
a network and sat there months or years silently siphoning national
secrets, source code and other sensitive data. "

-- 
Malaysia Open Source Software Conference 2011
MOSC2011 http://www.mosc.my/

Malaysia Open Source Conference 2012 (MOSC2012)
http://portal.mosc.my/

LinuxMalaysia Network
http://www.facebook.com/Bukan.Sekadar.Internet.Sahaja

Harisfazillah Jamel
_______________________________________________
OWASP-Malaysia mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-malaysia

OWASP Malaysia Wiki
http://www.owasp.my

OWASP Malaysia Facebook
http://www.facebook.com/OWASP.Malaysia

OWASP Malaysia Twitter #owaspmy
http://www.twitter.com/owaspmy

Reply via email to