Remove 06
Remove 2012 Remove Data Remove Information Security Remove Security
article thumbnail

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Security Affairs

This is part of a giant list of Living off the Land (LOL) techniques that attackers employ to mask their activities from runtime endpoint security monitoring tools such as AVs. OLE files are hierarchical data structures that have several storages and streams (in contrast to folders and files in an operating system). A deeper dive.