Last summer I wrote two blog posts about Kins malware; the first one with a detailed explanation of the Kins’s Virtual Machine (available here), and the other with an introduction to the similarities between Kins and Zeus malwares in their initialization process (available here). I had in mind to write a final chapter about the […]