Source |
Checkpoint |
Identifiant |
380684 |
Date de publication |
2017-07-04 00:58:04 (vue: 2017-07-04 00:58:04) |
Titre |
BROKERS IN THE SHADOWS – Part 2: Analyzing Petya\'s DoublePulsarV2.0 Backdoor |
Texte |
Background In the wake of WannaCry, a new cyber threat has emerged from the NSA leak. Making use of previously exposed tools, Petya once again is engaged in another large scale attack. Important distinctions in this case, however, are that the attacks targets specific victims, and are used solely for destruction. While Petya may look […]
|
Envoyé |
Oui |
Condensat |
again analyzing another appeared are attack attacks backdoor background blog brokers case check cyber destruction distinctions doublepulsarv2 emerged engaged exposed first from has however important large leak look making may new nsa once part petya point post previously scale shadows solely specific targets threat tools use used victims wake wannacry |
Tags |
|
Stories |
Wannacry
|
Notes |
|
Move |
|