Chinese Hackers use .chm Files to Hijack Execution Chain and Deploy Malware

The Chinese state-backed group TAG-74 is known for conducting intelligence collection on organizations in the following countries:- The TAG-74 utilizes .chm files to trigger a DLL search order hijack execution chain and deploy malware for loading a customized ReVBShell VBScript backdoor. Cybersecurity analysts at Recorded Future’s Insikt Group recently analyzed a Chinese state-sponsored cyber-espionage campaign, […] The post Chinese Hackers use .chm Files to Hijack Execution Chain and Deploy Malware appeared first on Cyber Security News.
http://dlvr.it/SwSF0R
Previous
Next Post »

Information Security Magazine

Latest Cyber Hacking News