TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents
Key takeaways The TAOTH campaign leveraged an abandoned Sogou Zhuyin IME update server and spear-phishing operations to deliver multiple malware...
Key takeaways The TAOTH campaign leveraged an abandoned Sogou Zhuyin IME update server and spear-phishing operations to deliver multiple malware...
Key takeaways The TAOTH campaign leveraged an abandoned Sogou Zhuyin IME update server and spear-phishing operations to deliver multiple malware...