mardi 3 novembre 2020

Threat actors get more creative in their attacks

The latest quarterly threat intelligence report from Kaspersky shows that many actors behind advanced persistent threats (APTs) have continued to diversify their toolsets, at times resorting to extremely tailored and persistent tools. At the same time though others have reached their goals by the employment of well-known, time-tested attack methods. Among new techniques is an attack infecting the UEFI (Unified Extensible Firmware Interface) making the malware planted on the device exceptionally persistent and extremely hard to remove. Other actors have made use of stenography including a new method abusing the Authenticode-signed Windows Defender binary. In many cases toolsets have been… [Continue Reading]


Aucun commentaire:

Enregistrer un commentaire