Stealthy malware persistence mechanisms

Discussion in 'malware problems & news' started by MrBrian, Nov 5, 2014.

  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1:

    Part 2
    Part 3
    Part 4

    Another one: COM Object hijacking: the discreet way of persistence.
     
  2. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  3. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  4. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From Persist It: Using and Abusing Microsoft's Fix It Patches:
     
Loading...