The Acronis Threat Research Unit has discovered espionage attacks on Taiwanese drone companies. The WordDrone malware is installed via a compromised version of Microsoft Word 2010 using DLL side-loading. Once installed, the malware establishes persistence, removes security software hooks and blocks known security tools. It communicates with a command and control server on a time-based schedule and receives new commands or payloads. The possibility of a supply chain attack is being investigated as initial malicious files were found in a Taiwanese ERP software folder.
New Malware Named Voldemort Utilizes Google Sheets to Store Pilfered Data
Hey there, folks in SF! Let’s talk about a spicy new trend that’s been making waves in cyberspace. It seems our not-so-friendly neighborhood hackers, always