In this post, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our…
Tag: rootkit
A week in security (Dec 04 – Dec 10)
Last week we launched Malwarebytes 3.0, our next-generation antivirus replacement. We also touched on domain generating algorithms (DGA), went up-close and…
Simple userland rootkit – a case study
Rootkits are tools and techniques used to hide (potentially malicious) modules from being noticed by system monitoring. Many people, hearing the…
No more Poweliks!
Poweliks is an infection that runs without a filesystem object, completely from the registry and memory using rundll32.exe, javascript and a…