Chinese LuckyMouse APT has been using a digitally signed network filtering driver in recent attacks
Chinese LuckyMouse APT has been using a digitally signed network filtering driver in recent attacks
Security experts observed the LuckyMouse APT group using a digitally signed 32- and 64-bit network filtering driver NDISProxy in recent attacks. Security experts from Kaspersky have observed the LuckyMouse APT group (aka Emissary Panda, APT27 and Threat Group 3390) using a digitally signed 32- and 64-bit network filtering driver NDISProxy in recent attacks. The APT group […]
The post Chinese LuckyMouse APT has been using a digitally signed network filtering driver in recent attacks appeared first on Security Affairs.
Read More At -> https://blog.cripperz.sg/2018/09/11/chinese-luckymouse-apt-has-been-using-a-digitally-signed-network-filtering-driver-in-recent-attacks/
0 comments:
Post a Comment