Additionally, the PlugX Remote Access Trojan (RAT) remains an active threat, while command-and-control (C2) traffic associated with infostealers and malware loaders continues to escalate.
The malware achieves persistence by adding the legitimate program to the Run registry key." Unlike past uses of PlugX, Checkpoint saw this campaign using RC4 encryption - a more advanced form than ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results