Remove 03
Remove 2015 Remove Government Remove IT Remove Marketing
article thumbnail

The Evolution of Aggah: From Roma225 to the RG Campaign

Security Affairs

Few months ago we started observing a cyber operation aiming to attack private companies in various business sectors, from automotive to luxury, education, and media/marketing. Figure 4: Malicious code contained in the malicious “blogspot” site. This additional piece of script is specifically designed to be executed by the “mshta” utility.