Chinese Remote Access Trojan: TAIDOOR

Chinese Remote Access Trojan: TAIDOOR

This report gives a very detail anatomy of the TAIDOOR trojan, if you have a good understanding of malware analysis or reverse engineering you will understand that this virus has the ability to remain hidden and go undetected by some of the most sophisticated Anti-virus programs because it utilises fileless attack techniques with a complex stream cipher, this is why this report https://us-cert.cisa.gov/ncas/analysis-reports/ar20-216a is a must-read report by all cyber security professionals to put us in a better position to defend and stand up to protect our cyber space.

要查看或添加评论,请登录

Marcus W. Johnson的更多文章

  • A Security Mirage Believed by Many Big Tech Companies in Africa.

    A Security Mirage Believed by Many Big Tech Companies in Africa.

    Written By: Marcus W. Johnson, Cyber Threat Intelligence Analyst, ICS/OT Cyber Risk Analyst & Threat Emulation Expert…

    3 条评论
  • What is Threat-Informed defense Culture?

    What is Threat-Informed defense Culture?

    Why should any institution be concerned about being threat-informed? A threat-informed defense is a strategy that…

  • ICS Attack Targets

    ICS Attack Targets

    Any hardware or software processing, storing, or transmitting information digitally is vulnerable to cyberattack…

    2 条评论
  • What is CTID and why is it essential to security professionals?

    What is CTID and why is it essential to security professionals?

    The Center for Threat Informed Defense is a necessity that grew out of the MITRE Project developed by MIT, designed to…

    3 条评论
  • MAC Address Flooding

    MAC Address Flooding

    MAC address flooding attacks bombard the switch with fake source MAC addresses until the switch MAC address table is…

社区洞察

其他会员也浏览了