Cybersecurity researchers on Wednesday took the wraps off a
“simple yet remarkable” malware loader for malicious Windows
binaries targeting Central Europe, North America and the Middle
East. Codenamed “Wslink” by ESET, this previously undocumented
malware stands apart from the rest in that it runs as a server and
executes received modules in memory. There are no specifics
available on the
“simple yet remarkable” malware loader for malicious Windows
binaries targeting Central Europe, North America and the Middle
East. Codenamed “Wslink” by ESET, this previously undocumented
malware stands apart from the rest in that it runs as a server and
executes received modules in memory. There are no specifics
available on the
Read more http://feedproxy.google.com/~r/TheHackersNews/~3/CSLKsRPB39g/new-wslink-malware-loader-runs-as.html