HP Wolf has reported the use of multiple, uncommon binaries and novel uses of legitimate image files in recent malicious campaigns
First seen on infosecurity-magazine.com
Jump to article: www.infosecurity-magazine.com/news/attackers-novel-lotl-detection/
![]()

