Detecting and Containing IRC-Controlled Trojans: When Firewalls, AV, and IDS Are Not Enough

by Corey Merchant
Sept. 24, 2017 1 comment Symantec firewall irc

This paper discusses IRC-based trojans as a distinctly underestimated class of malicious activity, and how real time security event monitoring is the key to identifying and containing similar compromises. It discusses the general methodology used to discover, track, and stop such malicious activity by presenting a real-world case study.

2flash 5 months ago

Complex and bold. This article truly is one of the reason I come back to SecurityDocs :)