{"version":"1.0","provider_name":"Firewalls.com","provider_url":"https:\/\/www.firewalls.com\/blog","author_name":"Rafi Chowdhury","author_url":"https:\/\/www.firewalls.com\/blog\/author\/crashdi\/","title":"Hollow Process - Firewalls.com","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"CNPR2NxO6B\"><a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/hollow-process\/\">Hollow Process<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.firewalls.com\/blog\/security-terms\/hollow-process\/embed\/#?secret=CNPR2NxO6B\" width=\"600\" height=\"338\" title=\"&#8220;Hollow Process&#8221; &#8212; Firewalls.com\" data-secret=\"CNPR2NxO6B\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.firewalls.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"What is a Hollow Process? A Hollow Process Injection, also called Process Hollowing, refers to the code injection technique used by hackers to replace the executable section of legitimate process with malicious code. This disguises malicious code so that a legitimate process will execute it. The legitimate path remains the same, but the malware is [&hellip;]"}