The threat actor uses sophisticated social engineering techniques to infect a victim’s device, either with an infostealer or remote access Trojan (RAT).
Go to Source
Author: Kristina Beek, Associate Editor, Dark Reading
Go to Source
Author: Kristina Beek, Associate Editor, Dark Reading