Somay Munde

2%
Flag icon
Kupreev determined that the rootkit was designed to hide four malicious .LNK files—the four other suspicious files they’d found on the system in Iran. The malware appeared to be using an exploit composed of these malicious files to spread itself via infected USB flash drives, and the rootkit prevented the .LNK files from being seen on the flash drive.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Rate this book
Clear rating
Open Preview