After a long period of silence, the MysterySnail RAT malware, first linked to Chinese-speaking threat group IronHusky APT in 2017, is now actively attacking in Mongolia and Russia. Kaspersky research has revealed upgraded features, including five DLL modules for command execution and encrypted payloads enabled for memory loading via DLL hollowing. A further simplified version, named MysteryMonoSnail, utilises the WebSocket protocol and has 13 basic commands.

Great Companies Don’t Just Build Apps, They Engineer Experiences
The most valuable asset a company has is its customers and in the digital world, mobile apps are the gateway to interaction with them. They