Advanced threat predictions for 2025
SecureList
NOVEMBER 25, 2024
These attacks were extremely carefully orchestrated – to conduct them, Lazarus stole the source code of a cryptocurrency-related computer game, promoted social media accounts related to that game, and obtained access to a unique chain of zero-day exploits used to infect targets visiting the game website.
Let's personalize your content