When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

The victims were mostly foreign ministries of eastern European countries, and similar state agencies.

The Chinese, however, are more interested in cyber-espionage.

A group of 7 hackers, 6 slightly blurred in the background and one in the foreground, all wearing black with hoods pulled up over their heads. You cannot see their faces. The hacker in the foreground sits with an open laptop in front of them. The background, behind the hackers, is a Chinese flag

The final step was using the same DLL side-loading methodology.