Dec. 20, 2023, 3 p.m. | Ghanashyam Satpathy

Threat Labs - Netskope www.netskope.com

Summary Threat actors often employ stealthy attack techniques to elude detection and stay under the defender’s radar. One way they do so is by using uncommon programming languages to develop malware. Using an uncommon programming language to develop malware provides several benefits, including: Evading some signature based detections Impeding analysis by malware analysts that are […]


The post A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government appeared first on Netskope.

attack attack techniques benefits campaign defender detection docs government language languages malware microsoft microsoft word nim programming programming language radar techniques threat threat actors threat labs uncommon under word

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC