Comments
-
I am not sure if this method can be called an exploit. Anyway, it can tamper with kernel drivers and protected services so one could call it an exploit of antimalware self-protection. I think that it can be (or already is) used in remote attacks or lateral movement against organizations. I noticed that one could use it to…
-
I could help, if I can get in contact with someone in charge. The attack method should not be published yet, so here is my email: (email address removed by admin) Regards