Malware researcher reverse engineered a threat that went undetected for at least 2 years
Security Affairs
AUGUST 20, 2018
What is interesting (at least in my personal point of view) is the way the attacker (ab)used the JS-JVM integration. In this stage the JavaScript is loading an encrypted content from the original JAR, using a KEY decrypts such a content and finally loads it (Dynamic Class Loader) on memory in order to fire it up as a new Java code.
Let's personalize your content