Malicious cryptography, part two

by Frederic Raynal
Sept. 15, 2017 2 comments Symantec Encryption & Authentication

Now in part two, a continued discussion of armored viruses (using polymorphism and metamorphism) will be followed by the concept of a Bradley worm - a worm that uses cryptography so that it cannot be analyzed. The reader will then look at Skype (now owned by eBay) as an example of an application with embedded cryptography and a closed protocol that can be manipulated by an attacker for malicious purposes, making a virus using this approach very difficult for administrators and anti-virus companies to detect.

https://www.symantec.com/connect/articles/malicious-cryptography-part-two

Avatar
2flash 2 months, 3 weeks ago

I got interested into this article after reading the description. Clearly-written and very professional stuff!

Reply
Avatar
Steven Ulm 2 months, 4 weeks ago

I was really hoping for a part two - as part one ended suddenly. Great stuff!

Reply