In this blog, we investigate how threat actors used information-stealing malware with EV code signing certificates and later delivered ransomware payloads to its victims via the same delivery method.
This article has been indexed from Trend Micro Research, News and Perspectives
Read the original article: