Connect with us

Tech

Persistent malware WordDrone exploits DLL Side-Loading to compromise Taiwan’s drone industry

Published

on

AboNpeASJNf5nBHAARoLnF 1200 80

A recent investigation by Acronis Threat Research Unit (TRU) has revealed an intricate attack which utilized an old version of Microsoft Word as a conduit for installing a persistent backdoor on infected systems.

WordDrone focuses on companies in Taiwan, particularly those involved in the drone manufacturing industry. The investigation revealed that the malware had been installed on systems in companies working in Taiwan’s growing drone industry, which has seen significant government investment since 2022.


Advertisement
Continue Reading
Advertisement

Trending