InvisibleFerret Malware: Technical Analysis
Editor’s note: The current article is authored by Mauro Eldritch, offensive security expert and threat intelligence analyst. You can find Mauro on X. Recently, during October and November, we observed a rise in North Korean activity employing a well-known and distinctive technique: staging job interview processes to spread multiple malware families. This signature technique was […]
The post InvisibleFerret Malware: Technical Analysis appeared first on ANY.RUN's Cybersecurity Blog.