cognitive cybersecurity intelligence

News and Analysis

Search

Persistent malware WordDrone exploits DLL Side-Loading to compromise Taiwan’s drone industry

The Acronis Threat Research Unit has discovered espionage attacks on Taiwanese drone companies. The WordDrone malware is installed via a compromised version of Microsoft Word 2010 using DLL side-loading. Once installed, the malware establishes persistence, removes security software hooks and blocks known security tools. It communicates with a command and control server on a time-based schedule and receives new commands or payloads. The possibility of a supply chain attack is being investigated as initial malicious files were found in a Taiwanese ERP software folder.

Source: www.techradar.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts