WORKSHOP NEWS - May 12-14 in Warsaw, Poland

18 Feb 2014 Julia Yuchin Cheng workshop
**Mon 5 May 2014 : : We are very proud to announce that ticket sales are beyond our expectations ! So hurry up if you are planning to attend and http://warsaw2014.honeynet.org/register.html for registration ! Wed 9 April 2014 : : FIRST.org joins the 2014 workshop Sponsorship team The honeynet project is proud to announce that the annual workshop in Warsaw will be sponsored by FIRST.org! The Forum of Incident Response and Security Teams (FIRST www.

GSoC 2014 Mentoring Organization Applications

14 Feb 2014 David Watson gsoc
Over the past five years, The Honeynet Project has been had the pleasure of mentoring over 70 lucky bachelors, masters and PhD students from all over the world through Google Summer of Code (GSoC), Google’s ongoing programme of support for international students working on free open source software (FOSS). Together we have worked on a large number of information security tools, including some that have gone on to be the leading examples of tools in their chosen field.

Malware-serving theaters for your android phones - Part 2

10 Jan 2014 Andrea De Pasquale android
In this post I will analyze the Android APK files that my friend Pietro Delsante from the Honeynet Project Sysenter Chapter talks about in his previous post (thank you Pietro). The files are all named “video.apk” and these are the MD5 and SHA256 hashes: video.apk 10859e82697955eb2561822e14460463 a36ecd528ecd80dadf3b4c47952aede7df3144eb9d2f5ba1d3771d6be2261b62 video.apk 91f302fd7c2d1b8fb54248ea128d19e0 8e0a2f6b7101e8caa61a59af4fdfc5b5629b8eac3a9aafcc1d0c8e56b4ddad15 video.apk f6ad9ced69913916038f5bb94433848d 4c7c0bd7ed69614cb58908d6a28d2aa5eeaac2ad6d03cbcad1a9d01f28a14ab9 The three APKs are almost identical: they share the same certificate and much more (I will cover the differences later).

Is Android malware served in theatres more sophisticated?

09 Jan 2014 Felix Leder android apk decompilation malware reverse-engineering sandbox-evasion thug
Pietro wrote a nice post about him finding Android malware while visiting the theatre. Thanks to Thug (thank you Angelo) and HoneyProxy, he was able to get some interesting details about their infrastructure. I was curious what kind of malware you find in a theatre, so I quickly looked at one of the samples that he mentioned: f6ad9ced69913916038f5bb94433848d. Virus Total already provides some nice information for Android. The SEND_SMS permissions already gives a solid hint that this application is probably sending to premium numbers.

Malware-serving theaters for your android phones - Part 1

07 Jan 2014 Pietro Delsante android apk exploit malware thug
Some nights ago I was heading to a local theater with some (non-nerd) friends. We did not recall very well the address, so I brought out my phone (LG Nexus 4 with Android 4.4.2 and Google Chrome) and googled for it. I found the theater’s official site and started looking for the contact info, when Chrome suddenly opened a popup window pointing me to a Russian web site (novostivkontakte.ru) urging me to update my Flash Player.

2014 Honeynet Project Security Workshop in Warsaw!

02 Jan 2014 Julia Yuchin Cheng workshop
The Honeynet Project would like to cordially invite you to attend the 2014 Honeynet Project Security Workshop , held in Adgar Plaza Conference Center in Warsaw, Poland from 12-14 May 2014. The workshop is organized by The Honeynet Project and coordinating with CERT Polska under NASK. Interested in sponsoring the workshop, download the **[Andrototal](http://warsaw2014.honeynet.org/images/sponsorshipdoc.pdf>workshop brochure now !Each year the workshop brings together experts in the field of information security from around the world to share the latest advances and threats in information security research.

SHIVA (Spam Honeypot with Intelligent Virtual Analyzer)

25 Nov 2013 Angelo Dellaera
SHIVA (Spam Honeypot with Intelligent Virtual Analyzer) is an open-source, high interaction spam honeypot developed in Python2.7 and is released under GNU GPL v3. SHIVA provides the capability of collecting and analyzing all spam thrown at it. Analysis of data captured can be used to get information on phishing attacks, scamming campaigns, malware campaigns, spam botnets, spammers identity etc. Following are the features which describes the functionality of SHIVA: Intelligence: A lot of research has been done to develop SHIVA and to counter the techniques used by spammers.

New project CEO

07 Oct 2013 Leon van der Eijk project-news
Last week it was announced that Angelo Dell’Aera is elected as our new CEO. Here is a brief description about Angelo. Angelo Dell’Aera is currently employed as Information Security Officer at International Fund for Agricultural Development (IFAD), a specialized agency of the United Nations. He’s currently Chief Executive Officer at Honeynet and leads the Sysenter Honeynet Project Chapter. His interests are mainly related to botnet tracking, honeyclient technologies and malware analysis.

Hide and go seek, not hide and go tweak

31 Jul 2013 David Dittrich active-response-continuum ethics humanitarian-law improper-ruse law-of-war tallinn-manual
On July 31, 2013, Jason Geffner of CrowdStrike discussed a new tool called “Tortilla” that allows incident responders and computer security researchers to hide behind the Tor network as they poke and prod malicious software infrastructure. Were I there, I would have asked Jason this question: What things should I not do while using Tortilla, and why shouldn’t I do them? I know Jason and respect his technical skills, but if he and CrowdStrike don’t have a good answer, that will say a lot about our field’s collective ability to reason about actions along the Active Response Continuum.

MalwareZ: visualizing malware activity on earth map

30 Jul 2013 Oguz Yarimtepe gsoc
MalwareZ is a visualization project that is started as a YakindanEgitim (YE) project. YE is a startup that me and some collegues mentor young people on specific projects, remotely. It is announced as a local fork of Google Summer of Code, except neither mentors nor mentees are paid. Gürcan Gerçek was the main developer for the MalwareZ project and my role was mentoring him. MalwareZ project idea arose from the 2011 GSoC project idea.