Java native code injection

Java is a really feature-rich object-oriented language. JNA (Java Native Access) is one of them, notably known to facilitate interaction with the memory and execution of native code. Explanations JNA library is used in Java technology to operate low-level operations […]

ICS security: method matters

“Common sense is the best distributed thing in the world, for we all think we possess a good share of it.” (René Descartes, Discours de la Méthode) In a context of economic crisis and increased competition, cyber security is rarely […]

Cert-Lexsi is a full member of FIRST since the beginning of this year. We had the opportunity to assist and speak at this organization’s annual conference in Malta last week with my colleague Jean-Michel: As usually in such conferences, I […]

Sorry, Mario, but the princess is in another citadel…

During the audit of an infected host looking for banking malware, we met a Citadel sample, identified by the folders it was stored in: “random” directory names in “C:\Documents and Settings\User\Application Data”, containing the binary, the modules or the configuration […]

Citadel: configuration file

We recently focused on the latest banking malware: Citadel. The Zeus source code release has made possible the creation of new banking malware, and Citadel is one of them. One of its particularities is the possibility for the customers to […]