Proofpoint researchers detailed how Bitter's attack chain utilized alternate data streams in a RAR archive to effectively deliver malware and create persistent threats on compromised machines.
The hacking group, known as Bitter, has been active since at least 2013 and is identified by various names, indicating its historical significance in cyber threats targeting South Asia.
Collection
[
|
...
]