Hackers Target Middle East Governments with Evasive “CR4T” Backdoor

Apr 20, 2024

The starting point of the attack is a dropper, which comes in two variants — a regular dropper that’s either implemented as an executable or a DLL file and a tampered installer file for a legitimate tool named Total Commander.

Get Free Report & Network Analysis

Please check your email for the free report.