In order to combat these threats, researchers from Perm Polytechnic developed a code to detect style. The code is designed on the basis of a number of rules to detect styles. The effectiveness of Russian development was 93%.

According to naked science publications, styles are used by attackers in complex attacks to collect information to systems and collect penetration. Lumma Stealer, which is masked under double extension files, is considered the most dangerous infosts. Therefore, methods of detecting antiviruses are not always effective against styles due to the flexibility of this software. Alternatively, the wound code was developed.

The unique wound rules were first developed by Perm polytechnic experts to detect Lumma Stealer viruses. This method analyzes the behavior and signature of the style for high detection accuracy.

However, new wound rules can be adapted to other family families.

“Our method analyzes the behavior of the virus: which procedures initiates, which files interact, even if it tries to use any technique to hide its job, this approach allows you to understand the characteristic behavior of the style even if its code has been changed or hidden. Daria Tarutina, the undergraduate student of the Telemekanik section, said.

Source: Ferra

Previous article“Social Network” will be a continuation directed by Aaron Sormin
Next articleBOSCH President criticized Europe for the “killer” arrangement of Jina and technology 26 June 2025, 03:00
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here