Parasitic malware has been always a headache. Valid files on the host computer are transformed using different techniques into malware by adding malicious code to them. Most of the time, the users affected by this kind of malware continue using their applications without realizing they are infected. The malware authors take care to transfer control back to the legit […]

Microsoft Office scripting malware has become more and more common and aggressive lately as malware authors constantly develop new techniques to evade detection and deceive users. This kind of malware, as mentioned in previous posts, usually arrives as an attached document within a phishing email. After the “document” is opened, it downloads the second-stage payload, […]