Ben LeeMalware Analysis Report: NotPetyaHey all, with the recent attacks on Ukraine through the malware WhisperGate peaking my interest, I thought I would try a fun little…Jan 24, 2022Jan 24, 2022
Ben LeeHow does a malicious attacker embed malware in a document and fool a victim to infect their PC?A malicious user can embed malware in a document, using social engineering to make a target infect their PC via a macro/powershell script…Oct 24, 2021Oct 24, 2021
Ben LeeDigital Forensics: MetadataDigital Forensics is one of the most important cybersecurity areas, being a branch of forensic science on the recovery, collection and…Oct 24, 2021Oct 24, 2021
Ben LeeAnalyzing Qakbot — w/ WiresharkHello everyone! Today we are going to do a quick analysis on Qakbot via a PCAP (Packet Capture) from Wireshark.Apr 16, 2021Apr 16, 2021