The MULTI#STORM phishing campaign employs JavaScript files to disseminate RATs throughout compromised systems. This intricate attack utilizes a multi-stage procedure that commences when the victim engages with a phishing email. The email includes a Python-based Loader that masquerades as OneDrive Utilities.
To receive real-time threat advisories, please follow HiveForce Labs on LinkedIn.
Get through updates and upcoming events, and more directly in your inbox