North Korea's ScarCruft Deploys RokRAT Malware via LNK File Infection Chains
Tuesday, 2 May 2023
Add Comment
The North Korean threat actor known as ScarCruft began experimenting with oversized LNK files as a delivery route for RokRAT malware as early as July 2022, the same month Microsoft began blocking macros across Office documents by default. "RokRAT has not changed significantly over the years, but its deployment methods have evolved, now utilizing archives containing LNK files that initiate
from The Hacker News https://ift.tt/pbuOSW9
Genrerating Link.... 15 seconds.
Your Link is Ready.
0 Response to "North Korea's ScarCruft Deploys RokRAT Malware via LNK File Infection Chains"
Post a Comment