[SANS ISC] Malicious Word Document Delivering an Octopus Backdoor
I published the following diary on isc.sans.edu: “Malicious Word Document Delivering an Octopus Backdoor“: Here is an interesting malicious Word document that I spotted yesterday. This time, it does not contain a macro but two embedded objects that the victim must “activate” (click on one of them) to perform the malicious activities.
The post [SANS ISC] Malicious Word Document Delivering an Octopus Backdoor appeared first on /dev/random.
Continue reading [SANS ISC] Malicious Word Document Delivering an Octopus Backdoor