Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.
What type of malware did the attacker use to bypass the company’s application whitelisting?
KnightHeart
1Â month agojonekool
2Â months agoJacket
2Â months, 2Â weeks ago000f1d9
2Â months, 2Â weeks agoFiete
2Â months, 3Â weeks agokillwitch
3Â months, 1Â week agomarcel9999
3Â months, 3Â weeks agoSukhoiF35
4Â months, 2Â weeks ago