LockPoS Point of Sale Malware Emerges

After being manually loaded and executed, the dropper continues by extracting a resource file from itself. The resource contains multiple components that are injected into explorer.exe and which act as a second-stage loader.

Read full news article on SecurityWeek

 


Date:

Categorie(s):