Source |
The Hacker News |
Identifiant |
3577040 |
Date de publication |
2021-10-28 00:59:45 (vue: 2021-10-28 22:06:10) |
Titre |
New Wslink Malware Loader Runs as a Server and Executes Modules in Memory |
Texte |
Cybersecurity researchers on Wednesday took the wraps off a "simple yet remarkable" malware loader for malicious Windows binaries targeting Central Europe, North America and the Middle East.
Codenamed "Wslink" by ESET, this previously undocumented malware stands apart from the rest in that it runs as a server and executes received modules in memory. There are no specifics available on the |
Notes |
|
Envoyé |
Oui |
Condensat |
america apart are available binaries central codenamed cybersecurity east eset europe executes from loader malicious malware memory middle modules new north off previously received remarkable researchers rest runs server simple specifics stands targeting took undocumented wednesday windows wraps wslink yet |
Tags |
Malware
|
Stories |
|
Move |
|