LockPoS Point of Sale Malware Emerges

0

After being manually loaded and executed, the dropper continues by extracting a resource file from itself. The resource contains multiple components that are injected into explorer.exe and which act as a second-stage loader.

Read full news article on SecurityWeek