new-red-text | WeLiveSecurity

new-red-text

Figure 3 – Potao droppers with MS Word icons and file names used in attacks against high-value Ukrainian targets to capture the interest of recipients