MIMICKING FILE NAMES
These Trojan horse naming issues go far beyond just putting spaces between the name and its file extension on Windows systems. Often, to fool a victim, attackers create another file and process with exactly the same name as an existing program installed on the machine e.g. “iexplore”, a Windows process.
Featuring "keycybr" CI&R Intern "Kumar Atul Jaiswal".
Get in touch with him - https://www.linkedin.com/in/whoiskumaratul/