Blurring of Commodity and Targeted Attack Malware

The following blog was written while working for CrowdStrike. It is available at https://www.crowdstrike.com/blog/blurring-of-commodity-and-targeted-attack-malware/.

As malware and its authors continue to evolve, deciphering the purpose of specific malware-driven attacks has become more challenging. While some malware still has a feature-specific design such as DDoS tools or spam bots, it is becoming increasingly common for malware to have multiple uses for different missions. Recent banking trojans for example are likely to support remote access, which is not typically required to deliver web injects and steal credentials.

Read the full post at https://www.crowdstrike.com/blog/blurring-of-commodity-and-targeted-attack-malware/.

Christian J. Dietrich
Christian J. Dietrich
Professor of Computer Security