A Ukrainian military-Themed Excel file loaded with malicious macro code is used to launch multi-stage Cobalt Strike Beacon malware on victims' devices, according to FortiGuard Labs and the PSIRT Collective.
TARGETED COUNTRY: Ukraine
ATT&CK IDS: T1055 - Process Injection, TA0011 - Command and Control, T1053 - Scheduled Task/Job, T1027 - Obfuscated Files or Information, T1104 - Multi-Stage Channels, T1140 - Deobfuscate/Decode Files or Information
Read More:
Comentarios