Legitimate VMware Binary Abused for Banking Trojan Distribution

The campaign, the security researchers say, also attempts to remain stealthy by using multiple methods of re-direction when infecting the victims’ machines. Furthermore, the attackers use a variety of anti-analysis techniques, while also employing a final payload written in Delphi, a technique rather unique to the banking Trojan landscape.

Read full news article on SecurityWeek

 


Date:

Categorie(s):