Source |
CrowdStrike |
Identifiant |
6509208 |
Date de publication |
2022-08-24 13:14:26 (vue: 2022-08-24 23:06:33) |
Titre |
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
Texte |
In Part 1 of this four-part blog series examining wiper malware, we introduced the topic of wipers, reviewed their recent history and presented common adversary techniques that leverage wipers to destroy system data. In Part 2, CrowdStrike’s Endpoint Protection Content Research Team discusses how threat actors have used legitimate third-party drivers to bypass the visibility […] |
Envoyé |
Oui |
Condensat |
actors adversary anatomy blog bypass common content crowdstrike’s data destroy discusses drivers endpoint examining four have history how introduced legitimate leverage malware part party presented protection recent research reviewed series system team techniques third threat topic used visibility wiper wipers |
Tags |
Threat
|
Stories |
|
Notes |
|
Move |
|