Search This Blog

Tuesday, May 16, 2017

Malicious registry keys: Reflective injection

Over the years, we have witnessed how cybercriminals have developed and implemented sophisticated new techniques to outwit users. That being said, one thing has not changed and remains a constant challenge: ensuring perseverance and avoiding detection both by security solutions and the human eye.
In recent months, we have started to receive various reports about suspicious and malicious registry keys that had been created on users’ equipment. For this reason, we decided to explore the subject further and started gathering interesting data which is presented in this article.

Malicious registry keys: Reflective injection

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.