USA technology

Persistent malware WordDrone exploits DLL Side-Loading to compromise Taiwan’s drone industry

A recent investigation by Acronis Threat Research Unit (TRU) has revealed an intricate attack which utilized an old version of Microsoft Word as a conduit for installing a persistent backdoor on infected systems.

WordDrone focuses on companies in Taiwan, particularly those involved in the drone manufacturing industry. The investigation revealed that the malware had been installed on systems in companies working in Taiwan’s growing drone industry, which has seen significant government investment since 2022.

Avatar

Vasundhara Mali

About Author

Leave a comment

Your email address will not be published. Required fields are marked *

You may also like

USA technology

Mysten Labs unveils specs for SuiPlay0X1 Web3 gaming handheld

GamesBeat Next is connecting the next generation of video game leaders. And you can join us, coming up October 28th
USA technology

Best Noise-Canceling Headphones (2024): Over-Ears, Wireless Earbuds, Workout

Now that the majority of new headphones and earbuds offer at least a modicum of noise canceling, it’d be impossible