Worok, a newly discovered cyber espionage group, has been hiding malware in seemingly innocuous image files, corroborating a critical link in the threat actor’s infection chain. Worok appears to be a complex cyber-espionage operation, with individual stages that remain largely unknown. Two security firms, however, have confirmed the operation’s final target. How Exactly Does Worok […]
The post Worok Hackers Abuse Dropbox API to Leak Data via Backdoor Hidden in Images appeared first on Heimdal Security Blog.
Leer másHeimdal Security Blog