MirrorFace Hackers Customized AsyncRAT Execution Chain to Run Within Windows Sandbox

The China-aligned advanced persistent threat (APT) group MirrorFace has updated its tactics, techniques, and procedures (TTPs) with a sophisticated approach to deploying malware. Known primarily for targeting Japanese entities, the group has expanded its operations to include a Central European diplomatic institute in a campaign dubbed Operation AkaiRyū (Japanese for RedDragon). Among their evolving tactics […]

The post MirrorFace Hackers Customized AsyncRAT Execution Chain to Run Within Windows Sandbox appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: