With the recent Corona outbreak, many students and employees used the Zoom application to chat, video, and audio conferencing. A group of hackers seized the opportunity and started to spread a trojan that mimics the behavior of the Zoom installer. We managed to acquire a sample of the Trojan, use your skills to reverse its behavior, and identify the authors of the Trojan.
Cybersecurity researchers have uncovered a new destructive data-wiping malware, dubbed ZeroCleare, that is being used by state-sponsored hackers in the wild to target energy and industrial organizations in the Middle East. They managed to capture a binary that may contain traces of the malware. Your task is to analyze the binary file to identify the behavior of the malware.
A critical zero-day vulnerability has been discovered in the Windows kernels, that could prevent some security software from detecting malware at runtime when loaded into system memory. Debug and analyze the kernel and find the security issue.
A research team discovered a flaw in the recent botnet called Mirai; they suspect that the source code is vulnerable. Inspect the binary.
French agencies managed to intercept the RETADUP malware that infected systems across the world. The Research team asks for your help to analyze and debug the shellcode.