
Threat Trends: APT42 - Crooked Charms, Cons, and Compromises
The Defender's Advantage Podcast
P T Forty Two - Custom Back Doors
A p t forty two typically focuses on credential harvesting. But recently, we've seen them shift a little bit with their techniques. They use malicious office documents to deliver different types of mowwar. We don't really know the initial infection ivector with this one but it likely was through a spear fishing link that delivered another malicious office document.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.