Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.
What type of malware did the attacker use to bypass the company's application whitelisting?
cerzocuspi
Highly Voted 2 years agoAnimal22
Highly Voted 10 months, 2 weeks agoDaniel8660
Most Recent 6 months, 3 weeks agopinguin666
10 months agoNovmejst
1 year, 4 months agomartco
1 year, 5 months agojinjection
1 year, 6 months agowhysoserious1199
1 year, 8 months agobrdweek
1 year, 6 months agoM4E_55
1 year, 9 months agobeowolf
1 year, 7 months agospydog
1 year, 6 months agoHayatoK
1 year, 9 months agoANDRESCB1988
1 year, 9 months agoGrezavi
1 year, 10 months ago