Active since at least 2019, the China-linked framework operates at network gateways to inspect and manipulate in-transit ...
The campaign exploits an Office vulnerability to deliver the modular XWorm RAT, chaining HTA, PowerShell, and in-memory .NET execution to sidestep detection and expand post-compromise control.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results