This report examines the infection chain and the pieces of malware used by malicious actors in supply-chain attacks that leveraged trojanized installers of chat-based customer engagement platforms.

- December 14, 2022
- by
- Cyber News, Cyber Threat Trends
- Less than a minute
- 292 Views
Related Post
- by Francis Schmuff
- April 4, 2025
Cyber Forensic Expert in 2,000+ Cases Faces FBI
A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30
- by Francis Schmuff
- April 4, 2025
SpotBugs Access Token Theft Identified as Root Cause
The cascading supply chain attack that initially targeted Coinbase before becoming more widespread to single out users of the “tj-actions/changed-files”
- by Francis Schmuff
- April 4, 2025
Troy Hunt Gets Phished
In case you need proof that anyone, even people who do cybersecurity for a living, Troy Hunt has a long,
- by Francis Schmuff
- April 4, 2025
Have We Reached a Distroless Tipping Point?
There’s a virtuous cycle in technology that pushes the boundaries of what’s being built and how it’s being used. A