Introduction

Introduction to Malware Forensics

Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008,1 the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The most current Symantec Internet Security Threat Report announced that threats to online security grew and evolved considerably in 2012. Noted was the burgeoning cyber espionage trend, as well as the increasing sophistication and viciousness of new malware threats. The report revealed that malware authors are conducting more targeted attacks aimed at spying on victims for profit and/or data collection—while attribution of the malware attackers is becoming more difficult. An identified increase ...

Get Malware Forensics Field Guide for Linux Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.