1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
1 year ago
12

Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been u

tilizing trojan versions of open-source software during their attack chain to achieve backdoor access. What is the commonly attributed name of the threat actor and an example of one of the open-source software that they have trojanized?.
Computers and Technology
1 answer:
Archy [21]1 year ago
5 0

The commonly attributed name of the threat actor is called ZINC. A wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC.

ZINC weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software installer for these attacks.

Who is ZINC?

ZINC is a nation-state activity group that is highly operational, destructive, and sophisticated. Active since 2009, the activity group gained public attention in 2014 after a successful attack on Sony Pictures Entertainment. ZINC is known to employ a number of custom remote access tools (RATs), including those identified by Microsoft as FoggyBrass and PhantomStar.

ZINC seeks to coerce employees of companies it is attempting to infiltrate into installing seemingly benign programs or opening weaponized documents containing malicious macros.

To know more about Open Source Software(OSS), visit: brainly.com/question/4593389

#SPJ4

You might be interested in
What is the Digital Living Network Alliance ?
Sedaia [141]

The digital living alliance network is a set of guidelines to share digital media among wired and wireless multimedia devices.

<h3>What is the digital living alliance network?</h3>

The Digital Living Network Alliance is a trade association that establishes rules and practices for home network equipment, incorporating computers, smartphones, etc.

It is a set of guidelines to share digital media among wired and wireless multimedia devices.

Learn more about digital on:

brainly.com/question/23749502

#SPJ12

8 0
2 years ago
Read 2 more answers
Device managment is the process of managing what kind of devices​
prisoha [69]

Mobile device management is a type of security software used by an IT department to monitor, manage, and secure employees' mobile devices (laptops, smartphones, tablets, etc.) that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.

6 0
3 years ago
What is the best way to limit a google search and get the most specific information possible?
Marrrta [24]
You go into settings on the google search and click advanced search. The rest you do on your own.
6 0
3 years ago
Gemima's classmate Tristan sent her an Excel table that shows the amount of vitamin C in seafood. She wants to
Kipish [7]
Answer: Link and use destination styles

Explanation: First copy the table on Excel you want to include in Word, now go to your Word document and press Ctrl + V to paste the contents into the Word file. In order to link, you have to click on the Paste Options button at the bottom right and choose either Match Destination Table Style and Link to Excel or Keep Source Formatting and Link to Excel.
7 0
3 years ago
Read 2 more answers
A(n) ____ occurs when a situation results in service disruptions for weeks or months, requiring a government to declare a state
Scorpion4ik [409]

I believe the answer is 'worst-case scenario.'

8 0
3 years ago
Other questions:
  • In the u.s.all financial institutions are required to conduct business at a physical location only
    9·1 answer
  • Steve is proofreading his memo and he notices that he has typed a phrase twice. Steve should _____.
    5·2 answers
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • #Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The fun
    14·1 answer
  • Graphs and charts are two different elements. True or False
    15·1 answer
  • Please explain why an operating system makes a great attack target.​
    9·1 answer
  • In order to get a comprehensive evaluation of the computer programmers he managed, Justin organized a(n) __________, where he as
    11·1 answer
  • • Microsoft Windows 7 Operating System • 7-Zip • Adobe Acrobat Professional • Adobe Reader • Google Chrome • Microsoft Internet
    8·1 answer
  • If you are going to refer to a few dozen classes in your application, how do<br> you do it?
    6·1 answer
  • Un comerciante de régimen código para comprar mercancías gravadas a un comerciante de régimen simplificado precio de venta al pú
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!