• RSS
  • Twitter
  • FaceBook
Home > White Papers > Damballa > Behind Today's Cyber ThreatInstallation Lifecycle

Behind Today's Cyber ThreatInstallation Lifecycle

Damballa

The distribution and installation of malicious and unauthorized software has evolved consistently throughout the 21st Century. The evolutionary path from annoying viruses, to destructive malware and on to financially driven crimeware, is well documented and can even be traced through the parallel evolution of technologies designed to counter each aspect of the then contemporary threat.

This paper examines the advancements of legacy malware installation techniques and those currently employed by professional cybercriminals. By understanding the modern crimeware installation lifecycle and exposing the reasoning behind each criminal tactic, organizations under the crosshairs of their attackers will better appreciate the limitations of the security technologies they currently deploy and will ideally be armed with the intelligence they need to develop more robust protection plans and incident response handling strategies.








Email this page
Published:  Nov 13, 2012
Length:  8
Type:  White Paper
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper, call-back, virtual analysis, zero-day threats, tdl4, stuxnet, spyeye, zeus, malware detection, cyber attacks, cybersecurity, cyber threats, cyber espionage



Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter