The China-aligned advanced persistent threat (APT) group MirrorFace has updated its tactics, techniques, and procedures (TTPs) with a sophisticated approach to deploying malware. Known primarily for targeting Japanese entities, the group has expanded its operations to include a Central European diplomatic institute in a campaign dubbed Operation AkaiRyū (Japanese for RedDragon). Among their evolving tactics […]
The post MirrorFace Hackers Customized AsyncRAT Execution Chain to Run Within Windows Sandbox appeared first on Cyber Security News.
This article has been indexed from Cyber Security News