Malware architectures – part 7 – (Propagation)
At this point the infected computer is under the control of the malware author or his/her command and control system. … Read More “Malware architectures – part 7 – (Propagation)”
At this point the infected computer is under the control of the malware author or his/her command and control system. … Read More “Malware architectures – part 7 – (Propagation)”
Now that the malware has made itself home to the targeted computer system, its time to hide its tracks and build up … Read More “Malware architectures – part 6 (Obfuscation)”
Now that the malware has taken root of the system, has its own processes running and has gained enough privileges … Read More “Malware architectures – part 5 (Persistence)”
In previous posts we talked about how a malware package/code gets into a system, this post will explain how it … Read More “Malware architectures – part 4 (Taking Control)”
The wave of APTs has grown and I think the name we are giving them should be changed. Rootkits, Worms … Read More “Advanced Persistant Threats(APTs), Ugh!!!”
In part one of this series we explained the different stages of the malware life-cycle. This post will cover in … Read More “Malware architectures – part 3 (Infection)”