all InfoSec news
A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government
Threat Labs - Netskope www.netskope.com
Summary Threat actors often employ stealthy attack techniques to elude detection and stay under the defender’s radar. One way they do so is by using uncommon programming languages to develop malware. Using an uncommon programming language to develop malware provides several benefits, including: Evading some signature based detections Impeding analysis by malware analysts that are […]
The post A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government appeared first on Netskope.
attack attack techniques benefits campaign defender detection docs government language languages malware microsoft microsoft word nim programming programming language radar techniques threat threat actors threat labs uncommon under word