MalwareMustDie, as a white-hat security research workgroup, launched in August 2012, is an NPO media for security professionals and researchers gathered to form the work-flow to reduce malware infection in internet. We work to raise malware awareness by sharing general information of malware infection scheme and trend to the common users, helping security vendors and public automation malware-related scanning/decoding tools by providing in depth decode analysis to the recent malware infection frameworks, and work with legal authorities to take down malware domains.
We aim to establish good relationships vertically with authorities, and horizontally with the fellow researchers and security entities, so that cooperation can be enlisted in dismatling domains that host malware and its infectors in internet.
Our analysis and reports can be viewed in our media i.e. our blog - in every posts we are not only sharing analysis information but sharing research materials for education in malware analysis and the sample to increase the malware detection rates, we always upload our malware samples in Virus Total after the analysis and precaution needed is done. We also share the method we used for research in our Google Project (contains of tools, codes and tips), and we share our research drafts, guides and intel by using our pastebin. You can reach those sites by using the link on the left side of this page.
Some of our recent achievement can be viewed in the On The News part, and in this link you can review the background and of why we think that our workgroup is necessary to exist. In the below part you can see news references and links for our popular analysis posts we shared.
If you're looking for our assitance please do not hesitate to mention us on twitter account @malwaremustdie
We are sorting and compiling the recent WWW news about us and our research for your reference about us in our official facebook account's time line, the older news can be viewed as per below list:
News: Deactivation of severe .RU malware infector domains (collaboration w/CERT-GIB)
News: The shutdown of Malware Domains served by Malicious DNS
New Guide to decode Blackhole infected sites released
News: Crusading Against Malware (Techie.com)
News: Octopi Managed Services: "About Malware Must Die"
News: Boeing-job.com Campaign and Adobe Flash 0days
Mentioned in: Sam Bowne's CNIT 126: Practical Malware Analysis
Mentioned in VRT/Snort: The 0-day That Wasn't: Dissecting A Highly Obfuscated PDF Attack
Mentioned in: Kahu Security - Clever Redirect to Impact EK
Analysis: VericonLabs: "Pseudo random JS/RunForrest Infector explained"
Mentioned in: Contagio - Blackhole 2 exploit kit (partial pack) and ZeroAccess
Mentioned in: E-Hacking News: Spam Tweets : "My aunt joined & is making 2k .."
Mentioned in: 0x109 - Evading AV signatures, BHEK2 way
Mentioned in: Undead Security - JDB Exploit Kit Payload
A Guide of confirming a hacked legit service by Blackhole Exploit Kit
Analysis - Botnets.fr: Getting more "personal" & deeper into Cridex with parfeit credential stealer infection
Analysis: Drive-by-Malware キEine Analyse (Eleven-securityblog.de)
Mentioned in: DNS-BH Sinkhole - Big Update: 211 Serenity Exploit Kit, Malspam, Malicious Domains
Mentioned in: Digital Forensics, Inc. "What happened if Red Kit Exploit Kit team up with BlackHole"
And many more.. please Google "MalwareMustDie" keyword for more..