Guidance

The hidden backdoor: how droppers spread malware

Created:  30 Sep 2016
Updated:  30 Sep 2016
CERT-UK Archive

Archive content originally produced by CERT-UK that is no longer supported.

How malicious actors use droppers and downloaders, how they work, what their role is in malware distribution and how they can be defended against.

The-hidden-backdoor-how-droppers-spread-malware.pdf

PDF, 568.73KB

This file may not be suitable for users of assistive technology.

Was this guidance helpful?

We need your feedback to improve this content.

Yes No