1. News
  2. Technology
  3. Persistent malware WordDrone exploits DLL Side-Loading to compromise Taiwan’s drone industry

Persistent malware WordDrone exploits DLL Side-Loading to compromise Taiwan’s drone industry

featured
Share

Share This Post

or copy the link

[ad_1]

A recent investigation by Acronis Threat Research Unit (TRU) has revealed an intricate attack which utilized an old version of Microsoft Word as a conduit for installing a persistent backdoor on infected systems.

WordDrone focuses on companies in Taiwan, particularly those involved in the drone manufacturing industry. The investigation revealed that the malware had been installed on systems in companies working in Taiwan’s growing drone industry, which has seen significant government investment since 2022.

[ad_2]

Source link

0
joy
Joy
0
cong_
Cong.
0
loved
Loved
0
surprised
Surprised
0
unliked
Unliked
0
mad
Mad
Persistent malware WordDrone exploits DLL Side-Loading to compromise Taiwan’s drone industry
Comment

Your email address will not be published. Required fields are marked *

Login

To enjoy 9News privileges, log in or create an account now, and it's completely free!

Follow Us