The Russia-linked nation-state threat actor known as APT28 utilized a security vulnerability in the Microsoft Windows Print Spooler to distribute a new custom malware named GooseEgg. This post-exploitation tool has been active since at least June 2020 and potentially even earlier, taking advantage of a patched flaw to operate undetected.
For more details, read the full article here.
Click here to contact Outsource IT