In order to deliver its malware, the attackers used an unusual supply-chain mechanism, abusing legitimate South Korean security software and digital certificates stolen from two different companies.
This site uses cookies to enhance your experience—by continuing, you agree to our use of cookies.
×