PikaBot Resurfaces with Streamlined Code and Deceptive Tactics,
The threat actors behind the PikaBot malware have made significant changes to the malware in what has been described as a case of « devolution. »
« Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced obfuscation techniques and changing the network communications, » Zscaler ThreatLabz researcher Nikolaos
« Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced obfuscation techniques and changing the network communications, » Zscaler ThreatLabz researcher Nikolaos
,
The threat actors behind the PikaBot malware have made significant changes to the malware in what has been described as a case of « devolution. »
« Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced obfuscation techniques and changing the network communications, » Zscaler ThreatLabz researcher Nikolaos
« Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced obfuscation techniques and changing the network communications, » Zscaler ThreatLabz researcher Nikolaos
, ,
https://thehackernews.com/2024/02/pikabot-resurfaces-with-streamlined.html