- Content source
- https://www.youtube.com/watch?v=kdxEgt_V-fI
The most interesting part starts after 10 minutes and 40 seconds.
The attack vector is specific to the machines with Comodo. Although the techniques used here are well known, the attacker must avoid many popular LOLBins that the Comodo Script Analysis covers. Such highly targeted attacks mainly affect businesses.
The part related to the delivery method (ClickFix, phishing, SEO poisoning, network shares, etc.) was skipped to keep the video shorter.
Last edited:




