HawkEye Malware Finds Renewed Life With Financially Motivated Actors. IBM X-Force researchers have reported an increase in the HawkEye v9 keylogger infection campaigns. Malicious third parties have long appreciated that the malware has a good reputation for its abilities as a dropper of other payloads (along with the key logging it can do) via botnets that can be controlled on its behalf. The IP addresses that originated the malspam came from Estonia, while users were targeted in countries around the globe.”]

