Malware researcher reverse engineered a threat that went undetected for at least 2 years
Security Affairs
AUGUST 20, 2018
What is interesting (at least in my personal point of view) is the way the attacker (ab)used the JS-JVM integration. We now have every decoding parameter, we just need to decrypt the classes by using the following data: ClassName. By using that technique the attacker can reach as many decryption stages as he desires. Secret Key.
Let's personalize your content