Persistent malware WordDrone exploits DLL Side-Loading to compromise Taiwan’s drone industry

0
8

A recent investigation by Acronis Threat Research Unit (TRU) has revealed an intricate attack which utilized an old version of Microsoft Word as a conduit for installing a persistent backdoor on infected systems.

WordDrone focuses on companies in Taiwan, particularly those involved in the drone manufacturing industry. The investigation revealed that the malware had been installed on systems in companies working in Taiwan’s growing drone industry, which has seen significant government investment since 2022.

LEAVE A REPLY

Please enter your comment!
Please enter your name here