In the post-MOTW era, when VBA macros are gone, Threat Actors devise multi-click infection chains to continue their shady business. Some approaches look really desperate, nonetheless quite ingenuine. This talk describes how various file formats can be chained together to achieve Initial Access.
In the post-MOTW era, when VBA macros are gone, Threat Actors devise multi-click infection chains to continue their shady business. Some approaches look really desperate, nonetheless quite ingenuine. This talk describes how various file formats can be chained together to achieve Initial Access. We are going to cover various ideas that when linked together, can pose threat to organisations and individuals in an unique, but a bit convoluted approach.
23 сен 2024