Chinese advanced persistent threat groups have been exploiting open-source and living-off-the-land tactics, including the use of Rakshasa and Stowaway reverse proxy programs, PlugX remote access trojan, and custom DLL files for login credential theft, as per Symantec Threat Hunter Team’s analysis.
Cybercriminals are using virtual hard drives to drop RATs in phishing attacks
Cybersecurity experts have warned that virtual hard drives are being used in phishing campaigns to deliver malware, a move that is difficult for antivirus software