The hidden backdoor: how droppers spread malware

Created:  30 Sep 2016
Updated:  30 Sep 2016
CERT-UK Archive

Archive content originally produced by CERT-UK that is no longer supported.

How malicious actors use droppers and downloaders, how they work, what their role is in malware distribution and how they can be defended against.


PDF, 568.73KB

This file may not be suitable for users of assistive technology.

Was this guidance helpful?

We need your feedback to improve this content.

Yes No