The "dark_nexus" bot is named by Bitdefender researchers. It is not a Windows malware this time. The Linux ELF format executables on IoT devices are their targets. That is, the possible victims may be routers (from Dasan Zhone, Dlink, and ASUS), video recorders and so on. There are 12 kinds of CPU architectures of embedded Linux are possible to be infected. The bots inside victims form the dark_nexus botnet. A message from the researches -
Hsinchu, Taiwan – February 10, 2020 – Razer Sila is the gaming router built by Razer. The Razer FasTrack engine inside the Razer Sila is the key feature pursued by a lot of gamers. All gamers hate lags in a running game. The Razer FasTrack engine lets you prioritize bandwidth when too many applications or devices are in use. So the lags will be minimized. Lionic develops this FasTrack engine based on its own AppQoS (Application based Quality of Service) technology according to Razer's opinions and gaming knowledge.
In 2019 December, IBM X-Force team published a report (https://www.ibm.com/downloads/cas/OAJ4VZNJ) detailing new variants of ZeroCleare: a data-destroying malware family attributed to Iran. According to the IBM X-Force report, there are several important points - The initial access IP address of this ZeroCleare is 184.108.40.206, which was associated with ITG13 in recent Oilrig/APT34 leaks, and as also reported by Palo Alto, was used to scan target networks and access accounts as early as the fall of 2018.
Introduction Many major media have reported this security event about New Orleans city including C/NET, BleepingComputer and others. From the information provided by these media, we are almost sure that the attacker is Ryuk ransomware. Figure 1 - C/NET news about New Orleans ransomware event Figure 2 - BleepingComputer news about New Orleans ransomware event Lionic’s Inspection on Ryuk Ransomware
Hsinchu, Taiwan – December 13, 2019 – The III (Institute for Information Industry) is one of the leading research organizations which follow government policies. Its subsidiary CSTI (Cybersecurity Technology Institute) focuses on security research and aim to upgrade the country security industry. Recently the CSTI has developed a proof of concept virus scanning service. Lionic, as a veteran in security industry, is invited to be the consultant and tester for this project.
Hsinchu, Taiwan – November 18, 2019 – AegisLab reviewed several CVE (https://cve.mitre.org/) entries and found the following 2018 CVE Vulnerabilities are not fixed yet. The CIRCONTROL is notified by the email on Oct 15 but no response so far. AegisLab has done the obligation to report to CIRCONTROL one month before publishing security report. Actually CIRCONTROL should begin fixing these vulnerable devices since 2018 but they did not. The header of Lionic's notifying email -
Hsinchu, Taiwan – October 8, 2019 – Lionic Corporation announced a new solution package - Minos SDK. There are several vulnerabilities found in popular soho routers and caused some disasters in these years. Many governments of countries decided to make laws for ensuring basic security of network appliances. This is a good thing. However, not every customer needs all technologies of Lionic. Some low cost soho routers do not want to spend much money for equipping with complete security features.
Business Partnership with Cyberfor Inc in Japan for Development of Internet Security Product & Service
LIONIC CORPORATION announced Business Partnership with Cyberfor Inc located in Tokyo, Japan , led by President & CEO, Mr. Mitsuhiro Oikawa for Development of Internet Security & Service. Cyberfor Inc is Internet security consulting firm in Tokyo, Japan. They are consulting internet security product development and business development for famous communication equipment companies in Japan. LIONIC CORPORATION and Cyberfor Inc will develop Japanese version of these software and incident Database and Signature Database for Internet Security Products which uses LIONIC software and serves to Japan market at first through Cyberfor Inc.
AegisLab Antivirus Premium is classfied by AV-Comparatives as Top 80 of 250 Antimalware apps without False Alarms
Hsinchu, Taiwan – March 19, 2019 – AegisLab, the subsidiary security research laboratory of Lionic corporation, is one of the pioneers in Android anti-virus industry. The famous AV-Comparatives organization published an Android Test 2019 Report about their independent tests of comprehensive Android Anti-virus software. It is surprisingly that there is roughly 250 apps on Google Play store which claimed they have anti-malware ability. However, only 80 of these 250 apps are working.