More

    Persistent malware WordDrone exploits DLL Side-Loading to compromise Taiwan’s drone industry



    A recent investigation by Acronis Threat Research Unit (TRU) has revealed an intricate attack which utilized an old version of Microsoft Word as a conduit for installing a persistent backdoor on infected systems.

    WordDrone focuses on companies in Taiwan, particularly those involved in the drone manufacturing industry. The investigation revealed that the malware had been installed on systems in companies working in Taiwan’s growing drone industry, which has seen significant government investment since 2022.

    https://cdn.mos.cms.futurecdn.net/AboNpeASJNf5nBHAARoLnF-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img