When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
The attack starts with a spear-phishing email carrying a malicious RDP configuration file.
If the victim runs it, it connects to an attacker-controlled RDP server.
Most of them are located in Europe, the United States, Japan, Ukraine, and Australia.
It is known for conducting cyber-espionage campaigns primarily in Western countries.
ViaBleepingComputer