Kimsuky APT Group Uses Using Powershell Payloads to Deliver XWorm RAT

A sophisticated campaign by the Kimsuky Advanced Persistent Threat (APT) group has been identified, utilizing elaborate PowerShell payloads to deliver the dangerous XWorm Remote Access Trojan (RAT). This North Korean-linked threat actor has evolved its tactics, leveraging heavily obfuscated PowerShell scripts as the initial infection vector to establish persistent access to victim systems while evading […]

The post Kimsuky APT Group Uses Using Powershell Payloads to Deliver XWorm RAT appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: