Enterprise Iot, Infrastructure

EyeSpy - Iranian Spyware Delivered in VPN Installers

August 16, 2022

eyespy-iranian-spyware
During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Spotlight

Hurify

To create a platform that helps in faster scaling of IoT by breaking the skill, complexity & cost barriers between IoT Development community and IoT Product builder’s community. While many companies are building High Productivity Application Platform as a Service (hpaPaaS) solution which are application abstraction layers that helps in easier and faster IoT development we are addressing the ground level problem of building core skills in engineers and helping them to connect with IoT product development opportunities.

OTHER WHITEPAPERS
news image

Securing Devices in Advanced Metering Infrastructures

whitePaper | January 8, 2020

Smart grid managers and Head End System (HES) vendors depend on data to drive their business. Receiving and analyzing accurate data from grid endpoints - the smart meters - is the main element that determines business success. Their customers, Distribution System Operators (DSOs) and Advanced Metering Infrastructures (AMI) managers, then use this data for crucial processes: monitoring energy demand and production, load shifting to maintain a persistent grid balance at all times and billing customers. Each tiny bit of data is the starting point for monetization and asset management and it must be accurate and trusted in order to keep power flowing.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More
news image

The IoT Trusted Zone

whitePaper | March 17, 2022

Among security best practices, system partitioning separates and isolates security-related hardware, software, and data in a “trusted zone” and tightly limits all attempts to access trusted content from outside the zone. Non-secure software cannot directly access secure resources. The Trusted Zone isolates security-related Microcontroller Unit (MCU) hardware, software, and external devices.

Read More
news image

The Matter Standard: Implementing Improved Security and Connectivity for the Smart Home

whitePaper | June 8, 2022

The smart home continues to evolve in available functions and complexity as several different connectivity protocols from numerous suppliers target a variety of products for use in smart homes. However, many consumers (71% according to incontrol) acknowledge fear of their personal information being stolen while using smart home products. At the same time, ease of use for user-installed products has often been elusive.

Read More
news image

Four Ways that Technology is Remolding the Digital Supply Chain

whitePaper | December 27, 2019

Industry 4.0 ideals challenge supply chains to deliver advanced capabilities beyond those inherent in typical operating functions. Emerging digital technologies are enabling processes, partners, products and services to work harmoniously to enhance today’s highly interconnected and networked supply chain.

Read More
news image

How to meet the IoT security requirements of today and tomorrow

whitePaper | July 4, 2023

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a region and thus to lost revenue. However, the regulations are constantly in a state of flux. This white paper provides updated background on what governments are suggesting or requiring as well as specific details on how to implement security defenses and obtain security certifications that can satisfy current and even future government requirements

Read More

Spotlight

Hurify

To create a platform that helps in faster scaling of IoT by breaking the skill, complexity & cost barriers between IoT Development community and IoT Product builder’s community. While many companies are building High Productivity Application Platform as a Service (hpaPaaS) solution which are application abstraction layers that helps in easier and faster IoT development we are addressing the ground level problem of building core skills in engineers and helping them to connect with IoT product development opportunities.

Events