Most Valued Members Nightowl 206 Posted April 2, 2023 Author Most Valued Members Share Posted April 2, 2023 Since AVs mark those applications as SAFE , most of their actions would be considered to be normal to the AVs if not all of their actions , and it's why malware developers get into the hassle of using a legit software for their illegal operation. Link to comment Share on other sites More sharing options...
itman 1,755 Posted April 2, 2023 Share Posted April 2, 2023 (edited) 5 hours ago, Nightowl said: Since AVs mark those applications as SAFE , most of their actions would be considered to be normal to the AVs if not all of their actions , and it's why malware developers get into the hassle of using a legit software for their illegal operation. Refer to this: https://www.wilderssecurity.com/threads/supply-chain-attack-against-3cxdesktopapp-30-mar-2023.451024/#post-3139609 for details on 3CX supply chain attack. Edited April 2, 2023 by itman Link to comment Share on other sites More sharing options...
Recommended Posts