Wednesday, August 3, 2011
"Operation Shady RAT"
"The attacks were carried out using spear-phishing emails, which are tainted with malicious software, to specific people at the organizations they targeted.
When people clicked on an infected link, the intruder was able to jump on to the machine and use it to infiltrate the organizations computer network, Reuters said."
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment