News Score: Score the News, Sort the News, Rewrite the Headlines

Hiding in plain sight: Modifying process names in UNIX-like systems

This post explores the defence evasion technique of dynamically modifying process names in UNIX-like systems. First observed as far back as the late '80s, the technique is certainly alive and well today. With a few minor tweaks from the original method possibly first found in use by the Morris worm, threat actors employee the post compromise technique today as a means to remain undetected. This post takes a look at various ways to "process masquerade" or "process stomp" primarily in the Linux op...

Read more at doubleagent.net

© News Score  score the news, sort the news, rewrite the headlines