Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques,
Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai.
« The target of the threat actors were Thailand officials based on the nature of the lures, » Nikhil Hegde, senior engineer for Netskope’s Security Efficacy team, told The Hacker News. « The Yokai backdoor itself is not
« The target of the threat actors were Thailand officials based on the nature of the lures, » Nikhil Hegde, senior engineer for Netskope’s Security Efficacy team, told The Hacker News. « The Yokai backdoor itself is not
,
Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai.
« The target of the threat actors were Thailand officials based on the nature of the lures, » Nikhil Hegde, senior engineer for Netskope’s Security Efficacy team, told The Hacker News. « The Yokai backdoor itself is not
« The target of the threat actors were Thailand officials based on the nature of the lures, » Nikhil Hegde, senior engineer for Netskope’s Security Efficacy team, told The Hacker News. « The Yokai backdoor itself is not
, ,
https://thehackernews.com/2024/12/thai-officials-targeted-in-yokai.html