malware installing additional software

0001-01-01

malware or threat actors may install additional software using the system’s package manager or official install media on compromised systems to ...

Read More

malware propagation

0001-01-01

malware propagation refers to the techniques and mechanisms used by malware to spread from one system to another.

Read More

malware replacing legitimate system components

0001-01-01

A common tactic of malware is to replace legitimate components of a system with modified, malicious versions.

For example, the ping program on Linux ...

Read More

malware setting files as immutable or append only

0001-01-01

Some malware on Linux and Unix-like systems will set immutable or append only filesystem attributes on their files to make them harder for a systems ...

Read More

malware strain

0001-01-01

A malware strain is malware that has been modified and closely resembles another related strain.

Read More

malware triage

0001-01-01

Malware triage is the process of quickly analyzing a suspected malware sample to determine its potential threat and to determine if it warrants deeper ...

Read More

malware update capability

0001-01-01

Often, malware may have the capability of updating itself.

Read More

malware using mutexes

0001-01-01

Malware often employs the use of mutexes to determine if a system has been infected already, often with the intent of not having multiple copies of ...

Read More

man hour

0001-01-01

A man hour is the amount of work perfomed by an average worker in one hour. This measurement is used for estimating labor requirements for tasks and ...

Read More

man in the middle

0001-01-01

Man in the Middle (MitM) is a type of cyberattack where the attacker is able to place themselves within the path of communication between devices and ...

Read More