I published the following diary on isc.sans.org: “UAC Bypass in JScript Dropper“.
Yesterday, one of our readers sent us a malicious piece of JScript: doc2016044457899656.pdf.js.js. It’s always interesting to have a look at samples coming from alternate sources because they may slightly differ from what we usually receive on a daily basis. Only yesterday, my spam trap collected 488 ransomware samples from the different campaigns but always based on the same techniques… [Read more]
[The post [SANS ISC Diary] UAC Bypass in JScript Dropper has been first published on /dev/random]
from Xavier
No comments:
Post a Comment