Widespread RAT compromise via bogus emails, JavaScript payloads detailed

Share This Post

[ad_1]

While attacks initially involved the distribution of a malicious HTML app that facilitated retrieval of a script enabling NetSupport RAT malware deployment, threat actors shifted to impersonate Next.js and other JavaScript libraries to deliver NetSupport RAT and BurnsRAT, according to an analysis from Kaspersky.

[ad_2]

Source link

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Do You Want To Boost Your Business?

drop us a line and keep in touch