cognitive cybersecurity intelligence

News and Analysis

Search

Novel SSH backdoor leveraged in Chinese cyberespionage attacks

The new Coyote trojan variant attack uses a LNK file to execute a PowerShell command, which helps retrieve a PowerShell script for launching the trojan. This trojan obtains system details and an antivirus product list while attempting to bypass sandbox discovery, says a Fortinet FortiGuard Labs study.

Source: www.scworld.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts