Malware loves Windows Task Scheduler
More malware is using Windows Task Scheduler to do its dirty work. Here's how to mitigate this surprising attack vector from Stuxnet worm, recent Zlob variants, and click-fraud Trojans like Bamital.
Stuxnet exploited Task Scheduler in a way that was previously unknown -- it was a true zero-day attack. But malware doesn't have to get too fancy to put Task Scheduler to ill use. For example, malware will often create a task that looks for certain preconditions to launch, downloads new malicious code on a schedule, or uses scheduled tasks as a way to always remain in memory. I've seen malware hunters struggle to find out how the malicious code "keeps re-infecting their clean system." Answer: Check the Task Scheduler. Read More - Click Here!
- Printer-friendly version
- Log in to post comments
- 3041 reads