Probing Weaponized Chat Applications Abused in Supply-Chain AttacksThis report examines the infection chain and the pieces of malware used by malicious actors in supply-chain attacks that leveraged trojanized installers of chat-based customer engagement platforms.
Source:
Probing Weaponized Chat Applications Abused in Supply-Chain Attacks