Blog
Shamoon 2: Nothing Whets Disttrack's Appetite Like Destroyed Data
By David Bisson on Sun, 12/04/2016
Most families of malware operate on a common assumption: a user's data is valuable. For instance, some malware samples transmit pieces of a victim's data to their command-and-control (C&C) server as means of setting up an attack, while others fully embrace the spyware classification and collect as much information about a user as possible. At the same...