Malware that are using this approach can still be detected with scanning the memory and inspecting the behaviors of processes but in terms of security products these operation are harder to Penetration testing blog and costly because of the higher resource usage Ramilli, [1]. Android Steal your Wi-Fi key from your doorbell?