malware installing additional software
0001-01-01
malware or threat actors may install additional software using the system’s package manager or official install media on compromised systems to ...
Read More
malware propagation
0001-01-01
malware propagation refers to the techniques and mechanisms used by malware to spread from one system to another.
Read More
malware replacing legitimate system components
0001-01-01
A common tactic of malware is to replace legitimate components of a system with modified, malicious versions.
For example, the ping program on Linux ...
Read More
malware setting files as immutable or append only
0001-01-01
Some malware on Linux and Unix-like systems will set immutable or append only filesystem attributes on their files to make them harder for a systems ...
Read More
malware strain
0001-01-01
A malware strain is malware that has been modified and closely resembles another related strain.
Read More
malware triage
0001-01-01
Malware triage is the process of quickly analyzing a suspected malware sample to determine its potential threat and to determine if it warrants deeper ...
Read More
malware update capability
0001-01-01
Often, malware may have the capability of updating itself.
Read More
malware using mutexes
0001-01-01
Malware often employs the use of mutexes to determine if a system has been infected already, often with the intent of not having multiple copies of ...
Read More
man hour
0001-01-01
A man hour is the amount of work perfomed by an average worker in one hour. This measurement is used for estimating labor requirements for tasks and ...
Read More
man in the middle
0001-01-01
Man in the Middle (MitM) is a type of cyberattack where the attacker is able to place themselves within the path of communication between devices and ...
Read More