Breaking Down the PROPagate Code Injection Attack
8/8/2018What makes PROPagate unique is that it uses Windows APIs to take advantage of the way Windows subclasses its window events.
Post a Comment
Dark Reading is part of the Informa Tech Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Scott specializes in malware research/reverse engineering and incident response. He's developed malware detection tools for a multinational conglomerate, analyzed APT attacks and tool kits, and consulted for the defense, manufacturing and financial industries. He's spent over 18 years in software development and information security, with prior roles at Northrop Grumman, Citi and as a consultant to GE's security group.