An attacker escalated privileges to a local administrator and used code refactoring to evade antivirus detection. The attacker t
hen allowed one process to attach to another and forced the operating system to load a malicious binary package. What did the attacker successfully perform?
It is indeed a sort of injection wherein the code being compelled to execute instead of any other program coding.
Such "injected" programming code is typically programming created to execute harmful tasks by a third-party programmer or operator, regarding reverse engineering assaults, mainly DLL injections attacks have been performed.