Friday, September 22, 2023

Chinese Hackers use .chm Files to Hijack Execution Chain and Deploy Malware

The Chinese state-backed group TAG-74 is known for conducting intelligence collection on organizations in the following countries:- The TAG-74 utilizes .chm files to trigger a DLL search order hijack execution chain and deploy malware for loading a customized ReVBShell VBScript backdoor. Cybersecurity analysts at Recorded Future’s Insikt Group recently analyzed a Chinese state-sponsored cyber-espionage campaign, […] The post Chinese Hackers use .chm Files to Hijack Execution Chain and Deploy Malware appeared first on Cyber Security News.
https://cybersecuritynews.com/chinese-hackers-chm-files/?utm_source=dlvr.it&utm_medium=blogger

No comments:

Post a Comment