Malware researcher reverse engineered a threat that went undetected for at least 2 years
Security Affairs
AUGUST 20, 2018
What is interesting (at least in my personal point of view) is the way the attacker (ab)used the JS-JVM integration. Today I’d like to share the following reverse engineering path since it ended up to be more complex respect what I thought. Stage1: JAR invoking JavaScript. This is totally interesting stuff :D.
Let's personalize your content