What is most interesting about this group’s more recent activity however, is their focus on users of encryption tools.
Description
A threat actor active since 2013 that’s responsible for spying campaigns against Turkish targets. They use zero-day attacks, social engineering tricks, and Trojanized software installers to deliver malware to their victims.
Mitigation is where enterprises need to start, prevention being significantly more effective and more cost-efficient than remediation after an attack
Read more