Malicious cryptography, part two

by Frederic Raynal Sept. 15, 2017 via Symantec

Now in part two, a continued discussion of armored viruses (using polymorphism and metamorphism) will be followed by the concept of a Bradley worm - a worm that uses cryptography so that it cannot be analyzed. The reader will then look at Skype (now owned by eBay) as an example of an application with embedded cryptography and a closed protocol that can be manipulated by an attacker for malicious purposes, making a virus using this approach very difficult for administrators and anti-virus companies to detect.

https://www.symantec.com/connect/articles/malicious-cryptography-part-two

Avatar
2flash 3 weeks, 1 day ago

I got interested into this article after reading the description. Clearly-written and very professional stuff!

Reply
Avatar
Steven Ulm 4 weeks, 1 day ago

I was really hoping for a part two - as part one ended suddenly. Great stuff!

Reply