Sept. 6, 2022, 8:44 p.m. | Robert Lemos, Contributing Writer, Dark Reading

Dark Reading www.darkreading.com

The threat actor — whose techniques and procedures do not match known groups — has created custom attack tools, including a program that hides scripts in .PNG images.

code obfuscated spy tools worok

Senior Manager, Response Analytics & Insights (Fraud Threat Management)

@ Scotiabank | Toronto, ON, CA, M3C0N5

Cybersecurity Risk Analyst IV

@ Computer Task Group, Inc | Buffalo, NY, United States

Information System Security Engineer (ISSE) – Risk Management Framework (RMF), AWS, ACAS, ESS.

@ ARA | Raleigh, North Carolina, United States

2024 Fall Cybersecurity Engineering Intern | Novi, MI

@ Dana Incorporated | Novi, MI, US, 48377

Consultant Sharepoint

@ Talan | Luxembourg, Luxembourg

Senior Information Systems Security Officer (ISSO) - onsite Tucson, AZ

@ RTX | AZ842: RMS AP Bldg 842 1151 East Hermans Road Building 842, Tucson, AZ, 85756 USA