Exfiltrate via HTTP POST or SFTP to attacker-controlled infrastructure such as a compromised domain or IP. Mynewsdesk 5Industrial Cyber 5The Hacker News 5 Threat Attribution: APT28
🧠LAMEHUG: The First AI-Powered Malware—LLMs Weaponized by APT28By Bivash Kumar Nayak – Founder, CyberDudeBivash | Cybersecurity & AI Researcher
Leave a comment