Malicious Office Macros: Detecting Similarity in the Wild

Many security solutions employ signature-based detection. To bypass this, attackers often rely on existing malicious samples to create new samples that preserve the original malicious behavior but have distinct signatures. This is usually done with the help of malware toolkits which can perform various transformations such as: obfuscation, packing, name shuffling, patching, etc. The resulting […]

The post Malicious Office Macros: Detecting Similarity in the Wild appeared first on Perception Point.

This article has been indexed from Perception Point

Read the original article: