Russia-linked APT28 and crooks are still using the Moobot botnet
Security Affairs
MAY 3, 2024
The threat actors used the botnet harvest credentials, collect NTLMv2 digests, proxy network traffic, and host spear-phishing landing pages and custom tools. The discovery underscores significant interest among different threat actors in compromising internet-facing routers. ” reported Trend Micro. ” reported Trend Micro.
Let's personalize your content