The sooner the better.
In the example below, we can see how many dangerous actions can be avoided just by blocking the starting element in the infection chain (LNK file).
Why do the attackers use such long infection chains?
The suspicious actions are split among many events/executables, and most AVs cannot link such actions to one attack. In this way, they can survive below the threshold level.
If one executable would do a similar amount of suspicious actions, it would be easily detected as malicious.
CoinMiner Malware Distributed via USB - ASEC
CoinMiner Malware Distributed via USB ASEC
asec.ahnlab.com
In the example below, we can see how many dangerous actions can be avoided just by blocking the starting element in the infection chain (LNK file).
Why do the attackers use such long infection chains?
The suspicious actions are split among many events/executables, and most AVs cannot link such actions to one attack. In this way, they can survive below the threshold level.
If one executable would do a similar amount of suspicious actions, it would be easily detected as malicious.
Last edited:
