<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://www.honeynet.org" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Blog postings from honeynet.org</title>
 <link>http://www.honeynet.org/feed/blogfeed</link>
 <description></description>
 <language>en</language>
<item>
 <title>Malware-serving theaters for your android phones - Part 1</title>
 <link>http://www.honeynet.org/node/1080</link>
 <description>&lt;p&gt;Some nights ago I was heading to a local theater with some (non-nerd) friends. We did not recall very well the address, so I brought out my phone (LG Nexus 4 with Android 4.4.2 and Google Chrome) and googled for it. I found the theater&#039;s official site and started looking for the contact info, when Chrome suddenly opened a popup window pointing me to a Russian web site (&lt;em&gt;novostivkontakte.ru&lt;/em&gt;) urging me to update my Flash Player. I laughed loudly and showed them to my (again, totally non-nerd) friends saying that the site had been owned. One of them went on and opened the site with her own phone (Samsung Galaxy S Advance with Android 4.4.1 and the default Android WebKit browser). To make a long story short, after a few instants her phone was downloading a file without even asking her for confirmation. So: Chrome on my Nexus 4 was using social engineering to have me click on a link and manually download the file; Android&#039;s WebKit on her Galaxy S Advance was instead downloading the file straight away: interesting! However, we were a bit late and we had to run for the comedy, so I did not even bother to see what the heck she had downloaded, I only made sure she hadn&#039;t opened it. I thought it was just the usual exploit kit trying to infect PCs by serving fake Flash Player updates, seen tons of those. While waiting for the comedy to begin, I quickly submitted the compromised site to three different services, the first three ones that came to my mind: HoneyProxy Client, Wepawet and Unmask Parasites, then turned off my phone and enjoyed the show.&lt;/p&gt;
&lt;div class=&quot;og_rss_groups&quot;&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li  class=&quot;first last og_links&quot;&gt;&lt;a href=&quot;/chapters/sysenter&quot; class=&quot;og_links&quot;&gt;Sysenter Chapter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1080&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <group domain="http://www.honeynet.org/chapters/sysenter" xmlns="http://drupal.org/project/og">Sysenter Chapter</group>
 <category domain="http://www.honeynet.org/taxonomy/term/188">android</category>
 <category domain="http://www.honeynet.org/taxonomy/term/194">APK</category>
 <category domain="http://www.honeynet.org/taxonomy/term/139">exploit</category>
 <category domain="http://www.honeynet.org/taxonomy/term/50">malware</category>
 <category domain="http://www.honeynet.org/taxonomy/term/218">thug</category>
 <pubDate>Tue, 07 Jan 2014 16:52:42 -0600</pubDate>
 <dc:creator>pietro.delsante</dc:creator>
 <guid isPermaLink="false">1080 at http://www.honeynet.org</guid>
</item>
<item>
 <title>Malware-serving theaters for your android phones - Part 2</title>
 <link>http://www.honeynet.org/node/1104</link>
 <description>&lt;p&gt;In this post I will analyze the Android APK files that my friend Pietro Delsante from the Honeynet Project Sysenter Chapter talks about in &lt;a href=&quot;https://www.honeynet.org/node/1080&quot;&gt;his previous post&lt;/a&gt; (thank you Pietro). The files are all named &quot;video.apk&quot; and these are the MD5 and SHA256 hashes:&lt;/p&gt;
&lt;div class=&quot;og_rss_groups&quot;&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li  class=&quot;first last og_links&quot;&gt;&lt;a href=&quot;/chapters/sysenter&quot; class=&quot;og_links&quot;&gt;Sysenter Chapter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1104&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <group domain="http://www.honeynet.org/chapters/sysenter" xmlns="http://drupal.org/project/og">Sysenter Chapter</group>
 <category domain="http://www.honeynet.org/taxonomy/term/188">android</category>
 <pubDate>Fri, 10 Jan 2014 01:53:51 -0600</pubDate>
 <dc:creator>andrea.depasquale</dc:creator>
 <guid isPermaLink="false">1104 at http://www.honeynet.org</guid>
</item>
<item>
 <title>Is Android malware served in theatres more sophisticated?</title>
 <link>http://www.honeynet.org/node/1081</link>
 <description>&lt;p&gt;&lt;a href=&quot;/node/1080&quot;&gt;Pietro wrote a nice post&lt;/a&gt; about him finding Android malware while visiting the theatre. Thanks to Thug (thank you Angelo) and HoneyProxy, he was able to get some interesting details about their infrastructure. I was curious what kind of malware you find in a theatre, so I quickly looked at one of the samples that he mentioned: &lt;a href=&quot;https://www.virustotal.com/it/file/4c7c0bd7ed69614cb58908d6a28d2aa5eeaac2ad6d03cbcad1a9d01f28a14ab9/analysis/&quot;&gt;f6ad9ced69913916038f5bb94433848d&lt;/a&gt;.&lt;/p&gt;
&lt;div class=&quot;og_rss_groups&quot;&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li  class=&quot;first last og_links&quot;&gt;&lt;a href=&quot;/chapters/giraffe&quot; class=&quot;og_links&quot;&gt;Giraffe Chapter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1081&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <group domain="http://www.honeynet.org/chapters/giraffe" xmlns="http://drupal.org/project/og">Giraffe Chapter</group>
 <category domain="http://www.honeynet.org/taxonomy/term/188">android</category>
 <category domain="http://www.honeynet.org/taxonomy/term/194">APK</category>
 <category domain="http://www.honeynet.org/taxonomy/term/311">decompilation</category>
 <category domain="http://www.honeynet.org/taxonomy/term/50">malware</category>
 <category domain="http://www.honeynet.org/taxonomy/term/108">reverse engineering</category>
 <category domain="http://www.honeynet.org/taxonomy/term/312">sandbox evasion</category>
 <category domain="http://www.honeynet.org/taxonomy/term/218">thug</category>
 <pubDate>Thu, 09 Jan 2014 16:44:49 -0600</pubDate>
 <dc:creator>felix.leder</dc:creator>
 <guid isPermaLink="false">1081 at http://www.honeynet.org</guid>
</item>
<item>
 <title>2014 Honeynet Project Security Workshop in Warsaw ! </title>
 <link>http://www.honeynet.org/node/1079</link>
 <description>&lt;p&gt;The Honeynet Project would like to cordially invite you to attend the &lt;strong&gt;2014 Honeynet Project Security Workshop&lt;/strong&gt; , held in Adgar Plaza Conference Center in &lt;strong&gt;Warsaw, Poland from 12-14 May 2014&lt;/strong&gt;. The workshop is organized by The Honeynet Project and coordinating with CERT Polska under NASK.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1079&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <pubDate>Thu, 02 Jan 2014 09:37:38 -0600</pubDate>
 <dc:creator>julia.cheng</dc:creator>
 <guid isPermaLink="false">1079 at http://www.honeynet.org</guid>
</item>
<item>
 <title>SHIVA (Spam Honeypot with Intelligent Virtual Analyzer)</title>
 <link>http://www.honeynet.org/node/1078</link>
 <description>&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1078&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <enclosure url="http://www.honeynet.org/files/SHIVA_Honeynet_Blog_11252013.doc" length="233582" type="application/msword" />
 <pubDate>Mon, 25 Nov 2013 03:36:23 -0600</pubDate>
 <dc:creator>angelo.dellaera</dc:creator>
 <guid isPermaLink="false">1078 at http://www.honeynet.org</guid>
</item>
<item>
 <title>New project CEO</title>
 <link>http://www.honeynet.org/node/1077</link>
 <description>&lt;p&gt;Last week it was announced that Angelo Dell&#039;Aera is elected as our new CEO. Here is a brief description about Angelo.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1077&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://www.honeynet.org/taxonomy/term/310">project news</category>
 <pubDate>Mon, 07 Oct 2013 02:55:47 -0500</pubDate>
 <dc:creator>leon.van.der.eijk</dc:creator>
 <guid isPermaLink="false">1077 at http://www.honeynet.org</guid>
</item>
<item>
 <title>Hide and go seek, not hide and go tweak</title>
 <link>http://www.honeynet.org/node/1076</link>
 <description>&lt;p&gt;On July 31, 2013, &lt;a href=&quot;http://www.blackhat.com/us-13/briefings.html#Geffner2&quot;&gt;Jason Geffner of CrowdStrike discussed a new tool called &quot;Tortilla&quot;&lt;/a&gt; that allows incident responders and computer security researchers to hide behind the Tor network as they poke and prod malicious software infrastructure.  Were I there, I would have asked Jason this question: What things should I &lt;em&gt;not do&lt;/em&gt; while using Tortilla, and &lt;em&gt;why&lt;/em&gt; shouldn&#039;t I do them? I know Jason and respect his technical skills, but if he and CrowdStrike don&#039;t have a good answer, that will say a lot about our field&#039;s collective ability to reason about actions along the Active Response Continuum. [D. Dittrich and K. E. Himma. Active Response to Computer Intrusions. Chapter 182 in Vol. III, Handbook of Information Security, 2005. &lt;a href=&quot;http://ssrn.com/abstract=790585&quot;&gt;http://ssrn.com/abstract=790585&lt;/a&gt;.]&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1076&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://www.honeynet.org/taxonomy/term/283">Active Response Continuum</category>
 <category domain="http://www.honeynet.org/taxonomy/term/222">ethics</category>
 <category domain="http://www.honeynet.org/taxonomy/term/307">humanitarian law</category>
 <category domain="http://www.honeynet.org/taxonomy/term/306">improper ruse</category>
 <category domain="http://www.honeynet.org/taxonomy/term/308">law of war</category>
 <category domain="http://www.honeynet.org/taxonomy/term/309">Tallinn Manual</category>
 <pubDate>Wed, 31 Jul 2013 16:59:48 -0500</pubDate>
 <dc:creator>david.dittrich</dc:creator>
 <guid isPermaLink="false">1076 at http://www.honeynet.org</guid>
</item>
<item>
 <title>MalwareZ: visualizing malware activity on earth map</title>
 <link>http://www.honeynet.org/node/1075</link>
 <description>&lt;p&gt;MalwareZ is a visualization project that is started as a &lt;a href=&quot;http://yakindanegitim.org/&quot;&gt;YakindanEgitim (YE)&lt;/a&gt; project. YE is a startup that me and some collegues mentor young people on specific projects, remotely. It is announced as a local fork of Google Summer of Code, except neither mentors nor mentees are paid.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://ggercek.wordpress.com/&quot;&gt;Gürcan Gerçek&lt;/a&gt; was the main developer for the MalwareZ project and my role was mentoring him.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1075&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <pubDate>Tue, 30 Jul 2013 05:57:06 -0500</pubDate>
 <dc:creator>oguz.yarimtepe</dc:creator>
 <guid isPermaLink="false">1075 at http://www.honeynet.org</guid>
</item>
<item>
 <title>GSoC2013 Blog Online</title>
 <link>http://www.honeynet.org/node/1068</link>
 <description>&lt;p&gt;To have a better visibility of this years GSoC projects we have created a blog for the students and their mentors. This blog is the place where students should post weekly updates about their progress. It is also the place where students and mentors can share their findings and experiences about and during the GSoC projects as they happen. The first updates have already started to drip in and it is getting interesting. &lt;/p&gt;
&lt;p&gt;A hot summer, cool drinks and happy coding to all the participants. &lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://gsoc2013.honeynet.org&quot;&gt;http://gsoc2013.honeynet.org&lt;/a&gt;&lt;/p&gt;
</description>
 <category domain="http://www.honeynet.org/taxonomy/term/44">gsoc</category>
 <pubDate>Mon, 24 Jun 2013 06:20:22 -0500</pubDate>
 <dc:creator>ali.ikinci</dc:creator>
 <guid isPermaLink="false">1068 at http://www.honeynet.org</guid>
</item>
<item>
 <title>Thug: 1000 commits, 1000 thanks</title>
 <link>http://www.honeynet.org/node/1067</link>
 <description>&lt;p&gt;Two years are passed from the first commit and taking a look at the number of committed patches I realized that right now the patch number 1000 was committed. Let me say it&#039;s really impressive realizing it. In the last two years I had a lot of fun thinking and designing the future of this project and I&#039;m really proud of what Thug turned to be. I have to thank a lot of persons who contributed with their suggestions, ideas, bug reports and sometimes patches. You know who you are. Really thanks!&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.honeynet.org/node/1067&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://www.honeynet.org/taxonomy/term/219">honeyclient</category>
 <category domain="http://www.honeynet.org/taxonomy/term/218">thug</category>
 <pubDate>Mon, 10 Jun 2013 10:17:22 -0500</pubDate>
 <dc:creator>angelo.dellaera</dc:creator>
 <guid isPermaLink="false">1067 at http://www.honeynet.org</guid>
</item>
</channel>
</rss>
