The development fits a trend that sees threat actors turning to well-known, commodity malware, overcoming its easy detection with ever-better obfuscation methods.
This post appeared first on ThreatPost – The First Stop for Security News
Author: Tara Seals