Diamond Member ThaHaka 0 Posted August 27 Diamond Member Share Posted August 27 This is the hidden content, please Sign In or Sign Up Users of ******** instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a ********* named HZ RAT. The artifacts "almost exactly replicate the functionality of the Windows version of the ********* and differ only in the payload, which is received in the form of shell scripts from the attackers' server," Kaspersky researcher Sergey Puzan said. HZ RAT was first This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/110940-h4ckn3wsmacos-version-of-hz-rat-backdoor-targets-chinese-messaging-app-users/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now