A second, custom backdoor was observed being deployed in attacks on four defense contractors if the primary backdoor was removed, security researchers with Palo Alto Networks’ Unit 42 division report.
- Posted on
- By SecurityIT
- In Cyberwarfare, Malware, NEWS & INDUSTRY, Virus & Malware, Virus & Threats