New Wslink Malware Loader Runs as a Server and Executes Modules in Memory



Cybersecurity researchers on Wednesday took the wraps off a “simple yet remarkable” malware loader for malicious Windows binaries targeting Central Europe, North America and the Middle East.
Codenamed “Wslink” by ESET, this previously undocumented malware stands apart from the rest in that it runs as a server and executes received modules in memory. There are no specifics available on the

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *