Hackers are now hiding malware in Windows Event Logs
Based on the various techniques and modules (pen-testing suites, custom anti-detection wrappers, final stage trojans) used in the campaign, a researcher noted that the entire campaign “looks impressive.”