IT threat evolution Q1 2022
SecureList
MAY 27, 2022
The attackers study their victims carefully and use the information they find to frame social engineering attacks. The group uses various malware families, including Wroba, and attack methods that include phishing, mining, smishing and DNS poisoning. When opened, this document eventually downloads a backdoor. Other malware.
Let's personalize your content