MalwareMustDie, as a white-hat security research workgroup, launched in August 2012, is an NPO media for security professionals and researchers gathered to form the work-flow to reduce malware infection in internet. We work to raise malware awareness by sharing general information of malware infection scheme and trend to the common users, helping security vendors and public automation malware-related scanning/decoding tools by providing in depth decode analysis to the recent malware infection frameworks, and work with legal authorities to take down malware domains.
We aim to establish good relationships vertically with authorities, and horizontally with the fellow researchers and security entities, so that cooperation can be enlisted in dismatling domains that host malware and its infectors in internet.
Our analysis and reports can be viewed in our media i.e. our blog - in every posts we are not only sharing analysis information but sharing research materials for education in malware analysis and the sample to increase the malware detection rates, we always upload our malware samples in Virus Total after the analysis and precaution needed is done. We also share the method we used for research in our Google Project (contains of tools, codes and tips), and we share our research drafts, guides and intel by using our pastebin. You can reach those sites by using the link on the left side of this page.
Some of our recent achievement can be viewed in the On The News part, and in this link you can review the background and of why we think that our workgroup is necessary to exist. In the below part you can see news references and links for our popular analysis posts we shared.
We often use the term "crusade", which is, adapted from the medieval terminology, used for a condition while a member is in online and contributing his "rest" time in research of analyzing a threat or a malicious scheme. The research itself is conducted by the member(s) in their free time after daily work and is not related to their professional obligation, as his contribution to our workgroup research.
All of research materials collected are investigated and checked for its credibility quality as cybercrime before posted as analysis research or passed as a report to the authority or to be published in our mentioned publication media. We often encourage the people in the info security to interact with our security experts in malware analysis and infection handling by providing Q & A assistance via twitter.
If you're looking for our assitance please do not hesitate to mention us on twitter account @malwaremustdie
We are sorting and compiling the recent WWW news about us and our research for your reference about us in our official facebook account's time line, the older news can be viewed as per below list:
News: Deactivation of severe .RU malware infector domains (collaboration w/CERT-GIB)
News: The shutdown of Malware Domains served by Malicious DNS
New Guide to decode Blackhole infected sites released
News: Crusading Against Malware (Techie.com)
News: Octopi Managed Services: "About Malware Must Die"
News: Boeing-job.com Campaign and Adobe Flash 0days
Mentioned in: Sam Bowne's CNIT 126: Practical Malware Analysis
Mentioned in VRT/Snort: The 0-day That Wasn't: Dissecting A Highly Obfuscated PDF Attack
Mentioned in: Kahu Security - Clever Redirect to Impact EK
Analysis: VericonLabs: "Pseudo random JS/RunForrest Infector explained"
Mentioned in: Contagio - Blackhole 2 exploit kit (partial pack) and ZeroAccess
Mentioned in: E-Hacking News: Spam Tweets : "My aunt joined & is making 2k .."
Mentioned in: 0x109 - Evading AV signatures, BHEK2 way
Mentioned in: Undead Security - JDB Exploit Kit Payload
A Guide of confirming a hacked legit service by Blackhole Exploit Kit
Analysis - Botnets.fr: Getting more "personal" & deeper into Cridex with parfeit credential stealer infection
Analysis: Drive-by-Malware ｷEine Analyse (Eleven-securityblog.de)
Mentioned in: DNS-BH Sinkhole - Big Update: 211 Serenity Exploit Kit, Malspam, Malicious Domains
Mentioned in: Digital Forensics, Inc. "What happened if Red Kit Exploit Kit team up with BlackHole"
And many more.. please Google "MalwareMustDie" keyword for more..