“The typical exploitation workflow consists of a user arriving at a landing page that fires multiple exploits (Flash, Reader, Java, etc.) which in turn results in a malware payload being downloaded to the user’s machine and ran from a specific location, often within the temporary files’ folder,” Jerome Segura, senior security researcher at Malwarebytes, explained in an email.”
Read MoreSelect your language