NeutrinoPoS – Old Trojan Shifts to New Targets

Next, the malware extracts a command and control (C&C) address list from its body and decodes it (the list is Base64-encoded). Next, the Trojan attempts to connect to a working C&C using a specific algorithm:

Read full news article on SecurityWeek

 


Date:

Categorie(s):

Tag(s):