One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 327874
Date de publication 2017-03-03 09:01:07 (vue: 2017-03-03 09:01:07)
Titre Fileless Powershell malware uses DNS as covert communication channel
Texte Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored.The latest example is an attack dubbed DNSMessenger, which was analyzed by researchers from Cisco Systems' Talos team. The attack starts with a malicious Microsoft Word document distributed through an email phishing campaign.When opened, the file masquerades as a "protected document" secured by McAfee, an antivirus brand now owned by Intel Security. The user is asked to click on the enable content button in order to view the document's content, but doing so will actually execute malicious scripting embedded within.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat abusing actually always analyzed antivirus are article asked attack attacks away brand but button campaign channel cisco click comment communication content covert distributed dns dnsmessenger document doing dubbed email embedded enable example execute file fileless from full here intel involve latest leave malicious malware masquerades mcafee microsoft monitored moving not now opened order owned phishing please powershell protected protocols read researchers scripting secured security some standard starts stealthier system systems talos targeted team techniques through tools traditional user uses view when which will within word
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: