This backdoor can be used for espionage and for dropping additional malware.
This post appeared first on ThreatPost – The First Stop for Security News
Author: Tara Seals
This post appeared first on ThreatPost – The First Stop for Security News
Author: Tara Seals