The threat actor whose techniques and procedures do not match known groups has created custom attack tools, including a program that hides scripts in .PNG images.
The threat actor whose techniques and procedures do not match known groups has created custom attack tools, including a program that hides scripts in .PNG images.