Assalamualaikum and salam sejahtera, A lot can be learn from reading this article.
How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1 1) Compromise servers are use by trojan to get "payload" to execute needed applications (download) or "phone home" to report or upload data that's the trojan target to compromise. " They determined that each time Stuxnet infected a system, it “phoned home” to one of two domains — www.mypremierfutbol.com and www.todaysfutbol.com hosted on servers in Malaysia and Denmark — to report information about the infected machines. " 2) Increase attack thats stealth and hook into behind operating system logic that's could not be detect by anti virus. And the target goal getting bolder. " Things changed as e-commerce took hold, and hackers began to focus on financial gain for their payloads — stealing credit card data, online banking credentials and corporate secrets. More recently, attacks have evolved to so-called advanced persistent threats — where attackers, some state-sponsored, patiently worked their way deep into a network and sat there months or years silently siphoning national secrets, source code and other sensitive data. " -- Malaysia Open Source Software Conference 2011 MOSC2011 http://www.mosc.my/ Malaysia Open Source Conference 2012 (MOSC2012) http://portal.mosc.my/ LinuxMalaysia Network http://www.facebook.com/Bukan.Sekadar.Internet.Sahaja Harisfazillah Jamel _______________________________________________ OWASP-Malaysia mailing list [email protected] https://lists.owasp.org/mailman/listinfo/owasp-malaysia OWASP Malaysia Wiki http://www.owasp.my OWASP Malaysia Facebook http://www.facebook.com/OWASP.Malaysia OWASP Malaysia Twitter #owaspmy http://www.twitter.com/owaspmy

