Remove tag security-rule
article thumbnail

APT28 and Upcoming Elections: evidence of possible interference

Security Affairs

Technical Analysis. Figure 2: password required to view and modify macros on document. The first peculiarity of the malicious document is the protected macro, in fact, when the user tries to read it immediately shows a message box asking for password. Figure 4: Payload stored in “Company” tag of document metadata.