How does Threat Extraction work?
Scan and extract files for Command and Control activity.
It emulates a document and, if malicious, converts it into a PDF.
It extracts active content from a document.
It scans the document for malicious code and removes it.
TESTED 18 Apr 2024