The Latest in IT Security

Using legitimate tools to hide malicious code

08
Nov
2017
Using legitimate tools to hide malicious code

shutterstock_184928255-990x400

The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity. One of them is the practice of hiding malicious code in the context of a trusted process. Typically, malware that uses concealment techniques injects its code into a system process, e.g. explorer.exe. But some samples employ other interesting methods. We’re going to discuss one such type of malware.

Read More

Leave a reply


Categories

TUESDAY, SEPTEMBER 18, 2018

Featured

Archives

Latest Comments

Social Networks