AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
P T Forty Two - Custom Back Doors
A p t forty two typically focuses on credential harvesting. But recently, we've seen them shift a little bit with their techniques. They use malicious office documents to deliver different types of mowwar. We don't really know the initial infection ivector with this one but it likely was through a spear fishing link that delivered another malicious office document.