*** Welcome to piglix ***

MalwareMustDie

MalwareMustDie
MalwareMustDie,NPO Official Logo.jpg
MalwareMustDie logo
Abbreviation MMD
Formation August 28, 2012; 4 years ago (2012-08-28)
Type
Purpose
Headquarters Japan, Germany, United States
Region
Global
Membership
< 100
Website http://malwaremustdie.org

MalwareMustDie,NPO as a whitehat security research workgroup, has been launched from August 2012. MalwareMustDie is a registered Nonprofit organization as a media for IT professionals and security researchers gathered to form a work flow to reduce malware infection in the internet. The group is known of their malware analysis blog. They have a list of Linux malware research and botnet analysis they had done. The team communicates information about malware in general and advocates for better detection for Linux malware.

MalwareMustDie is also known for their efforts in original analysis for a new emerged malware or botnet, sharing of their found malware source code to the law enforcement and security industry, operations to dismantle several malicious infrastructure, technical analysis on specific malware's infection methods, and reports for the cyber crime emerged toolkits.

Several notable internet threats that has been firstly discovered and announced by MalwareMustDie team are i.e. Prison Locker (ransomware), Mayhem (Linux botnet), Kelihos botnet v2 - ZeusVM - Darkleech botnet analysis - KINS (Crime Toolkit), Cookie Bomb (malicious PHP traffic redirection), Mirai - LuaBot - NyaDrop - NewAidra or IRCTelnet - Torlus aka Gafgyt/Lizkebab/Bashdoor/Qbot/BASHLITE) - LightAidra - PNScan - STD Bot - Kaiten botnets (Linux DDoS or malicious proxy botnet Linux malware), ChinaZ - Xor DDoS - IpTablesx - DDoSTF - DESDownloader (China DDoS Trojan).

The team has been also active in analysis for client vector threat's vulnerability, for example, Adobe Flash CVE-2013-0634 (LadyBoyle SWF exploit), and other Adobe vulnerability (undisclosed) in 2014 to have MalwareMustDie received Security Acknowledgments for Independent Security Researchers from Adobe. Another vulnerability researched by the team was reverse engineering a proof of concept for a backdoor case (CVE-2016-6564) of one brand of Android phone device that later on found affecting 2 billion devices.


...
Wikipedia

...