Sept. 22, 2022, 1:16 p.m. | Guardio

Stories by Guardio on Medium medium.com

By Nati Tal (Guardio Labs)

Following Part 1 in which we uncovered the enormous scale and efficiency of this malvertising campaign, in this part we dig deeper into the malware itself. How it is packed, what it really does to your computer, the tricks used by those threat actors to maneuver both victims and security mechanisms — to realize what exactly this record breaking file, with millions of downloads, is all about.

ISOtonic — Quick Facts:

  • Daily Downloaded Malware Files: …

army botnet bots cybersecurity malvertising malware analysis security analysis

More from medium.com / Stories by Guardio on Medium

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Application Security Engineer - Remote Friendly

@ Unit21 | San Francisco,CA; New York City; Remote USA;

Cloud Security Specialist

@ AppsFlyer | Herzliya

Malware Analysis Engineer - Canberra, Australia

@ Apple | Canberra, Australian Capital Territory, Australia

Product CISO

@ Fortinet | Sunnyvale, CA, United States

Manager, Security Engineering

@ Thrive | United States - Remote