Security consultant Andrzej Dereszowski shows how it’s possible to wage a counterattack in a targeted attack. His PoC was based on some fuzzing and reverse-engineering he conducted against malware used in an infected PDF. The PoC shows how in a. targeted attack using the Poison Ivy Trojan there’s a way to fight back against the attacker, he says. Similar techniques have been used by researchers and investigators in botnet infiltration research. DeresZowski: “You can [actually] hack the hackers and counterattack””]

