Tuesday, June 7, 2016
Feedly:Fortinet Blog | News and Threat Research - All Posts. On-Demand Polymorphic Code In Ransomware
from Fortinet Blog | News and Threat Research - All Posts
Ransomware is now a common term not only in the security industry, but also in our day-to-day life. A new ransomware seems to pop up almost every given day. What we don’t normally see is how codes are implemented within these malware. Ransomware employs different techniques and attack vectors in order to infiltrate your computer system. They also use different armoring techniques to evade detection and avoid analysis. One trick they use to harden themselves against analysis is through implementing metamorphic, encryption, and polymorphic algorithms.We...