Shining a Light on a New Technique for Stealth Persistenceby CyberAvalonOctober 12, 2018 Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence. Go to Source