![]() ![]() The bug is made to download, execute and rename files. DLL file and injects it into the legitimate process, and that file performs the actual backdoor routines. The malware attempts to connect to Evernote via its Chinese homepage, using the legitimate URL. “The backdoor may also use the Evernote account as a drop-off point for its stolen information.” ![]() In the latest compromise of online file-sharing services, the trojan BKDR_VERNOT.A “retrieves its C&C server and queries its backdoor commands in the notes saved in its Evernote account,” explained Trend Micro researcher Nikko Tamaña.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
February 2023
Categories |