‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect a victim’s device, either with an infostealer or remote access Trojan (RAT).

Go to Source
Author: Kristina Beek, Associate Editor, Dark Reading

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.