SP

Stijn Pletinckx

1 records found

Authored

Malware Coordination using the Blockchain

An Analysis of the Cerber Ransomware

In order for malicious software to receive configuration information or commands, malware needs to be able to locate and connect to its owner. As hard-coded addresses are easy to block and thus render the malware installation inoperable, malware writers have turned to dynamically ...