In this article I will summarize an attack scenario and I will focus on the malware part used to compromise the victim’s machine. Infection In this attack scenario, the victim visited a malicious website that requires running a java applet. The applet is malicious; it will download ...