IT threat evolution Q3 2023
SecureList
DECEMBER 1, 2023
To exfiltrate data and deliver next-stage malware, the attackers abuse cloud-based data storage, such as Dropbox or Yandex Disk, as well as a temporary file sharing service. The app descriptions were written in the respective languages and contained images very similar to those on the official Telegram page on Google Play.
Let's personalize your content