A sophisticated campaign by the Kimsuky Advanced Persistent Threat (APT) group has been identified, utilizing elaborate PowerShell payloads to deliver the dangerous XWorm Remote Access Trojan (RAT). This North Korean-linked threat actor has evolved its tactics, leveraging heavily obfuscated PowerShell scripts as the initial infection vector to establish persistent access to victim systems while evading […]
The post Kimsuky APT Group Uses Using Powershell Payloads to Deliver XWorm RAT appeared first on Cyber Security News.
This article has been indexed from Cyber Security News