In this blog CERT.at's employees can post research and thoughts. This is done with least possible oversight, so opinions in blogposts are not necessary opinions of CERT.at

Alternatively you can receive CERT.at's blog as a feed.


Apr 12

Lessons from the Stophaus/CloudFlare/Spamhaus DDoS for ISPs

Update: our full report on this incident is now available (in German)

No, the Internet is not breaking down, we did not have a doomsday scenario over the last week.

We did have an interesting situation, there were some disruption in some parts of the Internet, and there were a good number of ...


Mar 19

ProcDOT - Visual Malware Analysis

Dear like-minded people,

I'm very proud to announce that our latest contribution to the malware analysis community is finally available as open beta.

It's called ProcDOT - I already gave a preview of the alpha version some months ago at SANS Forensics Summit in Prague - and it is an absolute ...


Sep 21

Spikes in Austrian CCM number in Q4/2011

Microsoft's Security Intelligence Report 12 uses the computers cleaned per mille (CCM) metric to compare the infection rates over time and between countries.

This is, of course, no perfect measurement of the actual infection rates due to a number of factors, but nevertheless an interesting data-point. ...


Dec 19

IE6 Death Watch

Internet Explorer 6 has outlived its "good-before"-date for years now and both Web-programmers (living hell to support) and Microsoft (a security-nightmare for them) were keen to put a stake through its heart for the last years.

It finally seem to have worked: Austria is now at < 1% IE6 according ...


Apr 26

Tipping our Hats

It's not an everyday occurrence that an Austrian Company finds an important security issue. If they then follow responsible disclosure towards the vendor and also inform the local CERT, that's something that should be openly acknowledged.

Thus: A round of applause from CERT.at goes to Johannes Greil ...


Nov 04

Enabling DNSSEC Validation

This week, Comcast announced that they will enable DNSSEC validation on their production resolvers. One thing one might want to keep in mind if you do that:

People make mistakes. Some domain owners will break their DNSSEC signatures. We've seen a good number of these in 1010, including TLDs like ...


Nov 03

Yet another current fake AV infection

Tiny report of a yet another current fake AV infection which is being spammed out via Email. Warning: do not try to reproduce these results on a Windows PC unless you know what you are doing. As of the time of this writing, the URLs mentioned in this report are live and contain malware. Background Today the following Email (with attached Javascript file) caught my attention:

Nov 02

Mapping the Malware Web

McAfee published the 2010 "Mapping the Malware Web" report. The explanations and trends in there are worth looking at. More importantly, for us as the CERT, this report is one of the few independent studies which provides us with real numbers on the state of the IT Security game in Austria.

.at is ...