The AhnLab Security intelligence Center (ASEC) has identified a sophisticated campaign where threat actors are leveraging Hangul Word Processor (.hwp) documents to disseminate the RokRAT remote access trojan (RAT), marking a departure from traditional methods that relied on shortcut (LNK) files embedded with decoy content and malicious scripts. This shift to .hwp files, commonly used […]
The post Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Aman Mishra
Source: gbHackers
Source Link: https://gbhackers.com/threat-actors-using-hwp-files/