Jump to content

Trojan Dropper Remcos


Go to solution Solved by Marcos,

Recommended Posts

  • Most Valued Members

Since AVs mark those applications as SAFE , most of their actions would be considered to be normal to the AVs if not all of their actions , and it's why malware developers get into the hassle of using a legit software for their illegal operation.

Link to comment
Share on other sites

5 hours ago, Nightowl said:

Since AVs mark those applications as SAFE , most of their actions would be considered to be normal to the AVs if not all of their actions , and it's why malware developers get into the hassle of using a legit software for their illegal operation.

Refer to this: https://www.wilderssecurity.com/threads/supply-chain-attack-against-3cxdesktopapp-30-mar-2023.451024/#post-3139609 for details on 3CX supply chain attack.

Edited by itman
Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...