[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle
Security Affairs
MARCH 2, 2019
This is part of a giant list of Living off the Land (LOL) techniques that attackers employ to mask their activities from runtime endpoint security monitoring tools such as AVs. OLE files are hierarchical data structures that have several storages and streams (in contrast to folders and files in an operating system). A deeper dive.
Let's personalize your content