This spring, the cluster leveraged new versions of its malware. The threat actor also introduced another tactic to obstruct incident reconstruction: instead of retrieving a malicious payload, it loaded a language model file. So far, Silent Werewolf’s recent campaigns were limited to a few dozen organizations
We use cookies to personalize the services and the convenience of website users. You can prevent cookies from being stored in your browser settings. By using this website, you confirm your consent to the Privacy Policy.