KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!




New Windows ‘Pingback’ Malware Uses ICMP For Covert Communication Today, researchers have disclosed their findings on a novel Windows malware sample that uses Internet Control Message Protocol (ICMP) for its command-and-control (C2) activities. Dubbed “Pingback,” this malware targets Microsoft Windows 64-bit systems, and uses DLL Hijacking to gain persistence. Abuses real Windows service to load malicious DLL Today, Trustwave senior architect