Using legitimate tools to hide malicious code

Discussion in 'malware problems & news' started by Minimalist, Nov 8, 2017.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    https://securelist.com/using-legitimate-tools-to-hide-malicious-code
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Interesting they would mention Casey Smith:
    Guess Kaspersky doesn't realize he has went "dark" since the posted POC link doesn't work.
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    This once again shows how important firewalls are. It doesn't really matter which process is being hijacked, as long as it can't connect out. Obviously, it only makes sense to hijack processes that need outbound access in order to function like the browser and svchost.exe, but all other system processes need to be blocked from network access.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.