APT28 and Upcoming Elections: evidence of possible interference
Security Affairs
APRIL 12, 2019
Technical Analysis. Figure 2: password required to view and modify macros on document. The first peculiarity of the malicious document is the protected macro, in fact, when the user tries to read it immediately shows a message box asking for password. Figure 4: Payload stored in “Company” tag of document metadata.
Let's personalize your content