WhatsApp-based malware campaign exploits VBS scripts to deploy multi-stage attacks
The campaign combines social engineering with u201cliving-off-the-landu201d techniques.
While some of TA416u2019s techniques, tactics and procedures remained unchanged, Proofpoint observed the group modifying its infection chains.
The campaign combines social engineering with u201cliving-off-the-landu201d techniques.
Google didnu2019t disclose any additional details regarding the nature of exploitation.
As part of the breach, multiple AWS access keys were stolen and later used for unauthorized activity across a limited number of Cisco cloud accounts.
Attackers leveraged the update channel of TrueConf to deliver malware, more specifically a payload linked to the Havoc C&C framework.
The hackers hijacked the npm account of the library's developer and inserted a malicious dependency into the package configuration.
He now faces up to 10 years in prison on a computer fraud charge and up to 20 years if convicted of money laundering.