The availability of source code for both exploits and malicious code is higher than it has ever been in the history of computing. More importantly, codes for highly successful high-profile codes are now available. Several years ago it was almost impossible to get such codes, forcing actors to rely on minor changes to binaries to generate new variants of a family. With the source code, attackers can easily edit code, compile new "undetected" variants, and copy and paste code from multiple creations to create new codes.
展开▼