Malicious cryptography, part one

by Frederic Raynal
Sept. 15, 2017 2 comments Symantec Encryption & Authentication

Cryptology is everywhere these days. Most users make good use of it even if they do not know they are using cryptographic primitives from day to day. This two-part article series looks at how cryptography is a double-edged sword: it is used to make us safer, but it is also being used for malicious purposes within sophisticated viruses. Part one introduces the concepts behind cryptovirology and offers examples of malicious potential with the SuckIt rookit and a possible SSH worm. It then introduces armored viruses that use shape shifting (polymorphism and metamorphism) to avoid detection.

https://www.symantec.com/connect/articles/malicious-cryptography-part-one

Avatar
Steven Ulm 2 months, 4 weeks ago

Happy to read more and more quality stuff on cryptography ! Keep up the good writing :)

Reply
Avatar
2flash 2 months, 2 weeks ago

Only if 2006 would have known about the "extents" of cryptography in 2017... hahah

Reply