The AhnLab Security intelligence Center (ASEC) has identified a sophisticated campaign where threat actors are leveraging Hangul Word Processor (.hwp) documents to disseminate the RokRAT remote access trojan (RAT), marking a departure from traditional methods that relied on shortcut (LNK) files embedded with decoy content and malicious scripts. This shift to .hwp files, commonly used […]
The post Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform