分割したマルウェアを利用する標的型攻撃
最近、標的型攻撃でマルウェアを企業に送りつける手段として、ショートカットファイルがよく使われるようになってきました。シマンテックは、ネットワークに侵入するためにショートカットファイルが使われるさまざまな手法を確認しており、その一例を以前のブログでもお伝えしました。最近も、セキュリティ製品による検出をすり抜け、電子メールの受信者を欺いて添付ファイルを実行させるためにショートカットファイルが使われている...
View ArticleStorage Foundation High Availability (SFHA) 5.1SP1 Rolling Patch 4 (RP4) now...
SFHA 5.1SP1RP4 is now available on SORT:https://sort.symantec.com/patch/finder 11Veritas Storage Foundation HA 5.1SP1PR3Rolling Patchsfha-sol10_x64-5.1SP1PR3RP42013-08-2112Veritas Storage Foundation...
View ArticleImaginative Programs + Caring Mentors = Sparking STEM Interest in Underserved...
In its fiscal year 2013, Symantec contributed more than $24 million in cash and software to nonprofits working within its four philanthropic focus areas: science, technology, engineering, and math...
View ArticleG20 Summit Used as Bait to Deliver Backdoor.Darkmoon
Ahead of this week's G20 summit in Saint Petersburg, Russia, attackers are leveraging the meeting's visibility in targeted attacks.One particular campaign we have identified is targeting multiple...
View ArticleGood Security Equals Privacy
If it’s worth doing, it’s worth doing on the Internet. And it’s not just Silicon Valley startups that feel this way – cybercriminals do, too. In fact, most types of cons and crimes have migrated to the...
View ArticleBackdoor.Darkmoon を拡散するワナとして利用される G20 サミット
今週ロシアのサンクトペテルブルクで開催が予定されている G20 サミットを目前にして、攻撃者はサミットの知名度を標的型攻撃に利用しています。シマンテックが検出したある攻撃では、金融機関、金融サービス企業、政府機関、経済開発関連の組織など複数のグループを標的としています。 図 1. G20 の代表から送信されたと騙る電子メール この電子メールは、G20...
View ArticleOutlook Add-in versions
Do you know what version of the Outlook Add-in is running in your environment? Do you care what version is running? You should - and in many organisations even those that employ software deployment...
View ArticleConnect Dev Notes: 04 September 2013
Updates deployed to the Connect production servers as a result of the code sprint that ended 03 September 2013.User Facing: DesktopChanged the Quick Search in the Help Center to look for titles that...
View ArticleSpanish RAT
Contributor: Roberto Sponchioni Symantec Security Response has recently come across a new remote administration tool (RAT) called Alusinus, which we detect as Backdoor.Alusins. The program was intended...
View ArticleSave the Date - VMware Backups That Work Google+ Hangout
We’ve pushed the backup performance envelope so that you don’t have to! VMware Backup Benchmarks have been around since 2007 and continue to be an important part of keeping data centers running...
View Articleスペイン語の RAT
寄稿: Roberto Sponchioniシマンテックセキュリティレスポンスは最近、Alusinus という新しいリモートアクセスツール(RAT)を発見しました(Backdoor.Alusinsとして検出されます)。これは、スペイン語圏のアンダーグラウンド向けのプログラムで、ビルダー自体はいくつかの標準機能を備えた単純なものですが、その中に興味深く、特筆に値する機能が 1...
View ArticleEnterprise Vault 11 Beta Program
Are you eager to get a sneak peek into the all new and exciting features of Enterprise Vault 11 release? Then here is your chance to do so, by participating in the upcoming Enterprise Vault 11 Beta...
View ArticleSmall Businesses: The Shift in Website Threats
Last year saw a shift in website threats, with more targeted attacks emerging that were aimed at small and medium businesses. While website security should always be at the forefront of any online...
View ArticleComing Soon: Symantec's 2013 Corporate Responsibility Report
Corporate responsibility is inherent to Symantec’s business and built into our priorities and values. This month Symantec will release its FY13 Corporate Responsibility Report, which provides an update...
View ArticleWhen is a Basic Inventory not a Basic Inventory?
Today is riddle day. So here it is in full:When is a basic inventory not a basic inventory?When it's a custom inventory!!!So, now this explains why we are getting thousands of customer inventory every...
View ArticleNetBackup Snapshot Client Terminology Explained
Recently one of the fans of NetBackup on Facebook asked a question. Although his questions were specific to the difference between Snapshot client backup and regular backups, I thought it might be...
View ArticleEnterprise Vault retrievals using Outlook Web App
A question which came from the Symantec Enterprise Vault Connect forums the other day deserves a little more of an answer than I originally gave. The question is: When you retrieve an item from a...
View ArticleCreating Self-Documenting Monitor Solution Reports
Been messing the last few days with a combination of t-sql and Word macros to create a way of documenting the policies and rules for Altiris Monitor 7.1 servers.All pretty much done, so am writing up...
View ArticleNetBackup 7.6 First Availability (FA) Program announced for October
Recently, a letter was sent out announcing the NetBackup 7.6 First Availability (FA). If you didn't receive it, here is a crossposting. (Note that I personally have no information beyond what's in...
View Article