New Wslink Malware Loader Runs as a Server and Executes Modules in Memory

In The Hacker News - Original news source is thehackernews.com by Blog Writer

Post Sharing
Cybersecurity researchers on Wednesday took the wraps off a “simple yet remarkable” malware loader for malicious Windows binaries targeting Central Europe, North America and the Middle East.
Codenamed “Wslink” by ESET, this previously undocumented malware stands apart from the rest in that it runs as a server and executes received modules in memory. There are no specifics available on the