![](https://3.bp.blogspot.com/-MQg8viWAgAA/Xr5kC1UZ_GI/AAAAAAAAAWI/gUzYNHlcQRoZDshnXSiJoSN6AqNBhN3kgCLcBGAsYHQ/s72-c-e100/hacking.jpg)
A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe. The cyberespionage malware—traced to Turla APT with « medium-to-low level of confidence » based on the history of compromised victims—spread via an initial dropper that masks itself as
Source de l’article sur The Hacker News
Laisser un commentaire
Participez-vous à la discussion?N'hésitez pas à contribuer!