Blog | G5 Cyber Security

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers command and control server. The operation remains active at the time of writing this post, with attacks reported as recently as February 2017. The threat actor uses social engineering to lure targets into installing a malicious application, while continuously attempting to acquire confidential information using social networks. One variant pretends to be a YouTube player, while others are chat apps.”]

Source: https://securelist.com/breaking-the-weakest-link-of-the-strongest-chain/77562/

Exit mobile version