More malware is using Windows Task Scheduler to do its dirty work. Here's how to mitigate this surprising attack vector from Stuxnet worm, recent Zlob variants, and click-fraud Trojans like Bamital.
Stuxnet exploited Task Scheduler in a way that was previously unknown -- it was a true zero-day attack. But malware doesn't have to get too fancy to put Task Scheduler to ill use. For example, malware will often create a task that looks for certain preconditions to launch, downloads new malicious code on a schedule, or uses scheduled tasks as a way to always remain in memory. I've seen malware hunters struggle to find out how the malicious code "keeps re-infecting their clean system." Answer: Check the Task Scheduler. Read More - Click Here!