0DAYOne of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit JPG and using techniques where the malicious payload is hidden in encrypted files – even using a known file format. This is what we found in a new JPG Exploit in the wild: it tries to conceal the malicious files in a Exploit JPG File. And the attack starts with a simple Exploit JPG.
: live:hacktools060
Stock | Unlimited |
Product Type | File |
File Type | application/pdf |
File Size | 87.09 KB |
Secure service provided by Rocketr | Terms | Report Abuse