Session

Malware and Hunting for Persistence: how adversaries hacking your Windows?

The story of how I discovered several non-standard and unusual methods for malware persistence using the registry
modifications and DLL hijacking vulnerability: Windows Internet Explorer, Win32API Cryptography features, Windows
Troubleshooting Feature and Process Hacker 2.
Research in the field of hunting new persistence techniques for malware.
Also a comparison of these methods with classical tricks and techniques that are used by various APT groups and
Ransomware's authors.

Zhassulan Zhussupov

Malware Researcher, Threat Hunter, Buttefly Effect Team

Istanbul, Turkey

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top