Fake Screenshot Lures Used to Infect Web3 Support Staff With Multi-Stage Malware

A threat group known as APT-Q-27 has been running an active campaign against Web3 customer support teams, using fake screenshot links in live chat windows to silently install a persistent backdoor on victim machines. The attack targets the most human part of any organization — the support agent answering tickets — rather than exploiting software […]

The post Fake Screenshot Lures Used to Infect Web3 Support Staff With Multi-Stage Malware appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: