Star 0

Abstract

2016 Hackers from Fancy Bears attack WADA, NSA gets a leak of backdoors for popular network equipment. In general, the industry is developing, and the progress does not stand still. However, ITW network has malware that sometimes surprisingly differs from typical and advanced examples of the malicious code. This report will discuss such programs, how they differ from others and what techniques they use to achieve the typical “virus” goals.

Slides