North Korea’s Kimsuky Doubles Down on Remote Desktop Control

The sophisticated APT employs various tactics to abuse Windows and other built-in protocols with both custom and public malware to take over victim systems.

Source: Dark Reading: Cloud

 


Date:

Categorie(s):