Malware

Launching the First “Yomi Hunting” Challenge!

About a year ago, Yoroi released the Yomi Hunter sandbox, today, they love to challenge the malware community with the first “Yomi Hunting” contest.

About a year ago, we publicly released the Yomi Hunter sandbox for a few simple reasons: in Yoroi we believe in the InfoSec community value, we think it plays a central role in the fight of cyber-threats and we feel the need to support it. 

Our sentiment regarding the InfoSec community led us to support the Italian CTF team in their path to the final round of the European Cyber Security Challenge tournament last year. But, we also love to create things, so we were the first Italian Private Company launching and maintaining a public instance of the sandbox technology we developed across the years. 

It was natural for us to try to give back something to the community we believe in, concretely.

Today is different.

Today, we’d love to challenge the malware community with the first “Yomi Hunting” contest. Literally, a malware and threat hunting contest with a simple and straightforward goal: hunt the bad guys.

So we are inviting malware analysts, security professionals and community researchers to feed the Yomi boxes with good malware, to stay in touch with the Yoroi twitter account to work with us and the other good guys.  

Of course, as every contest, “Yomi Hunting” has some cool prizes too, such as the possibility of the publication of a joint malware research with our Z-LAB, along with awards and other fun stuff we will ship to the most active researchers participating in the contest.

Well, how to participate?

It’s quite simple: Just go to the Yomi Hunter registration page, create a free community accountsubmit interesting samples and get in touch with us on our socials and share your findings! Or just include the “#yomihunter” hashtag to your tweets.

How it works?

The contest will start on 17 February 2020 and will end on 31 March 2020. At the end of the contest the three most active researchers submitting more samples will be rewarded with:

  1. First prize: backpack, shirt, agenda and gadgets
  2. Second place: shirt, agenda and gadgets
  3. Third place: agenda and gadgets

Every participant can monitor the chart through the Yomi Hunter “Wall of Fame” here.

Happy Hunting!

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Yomi)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 47

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

1 hour ago

Security Affairs newsletter Round 526 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

4 hours ago

Two Linux flaws can lead to the disclosure of sensitive data

Qualys warns of two information disclosure flaws in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise…

21 hours ago

Meta stopped covert operations from Iran, China, and Romania spreading propaganda

Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…

2 days ago

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator

The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…

2 days ago

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…

2 days ago