1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
1 year ago
12

Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been u

tilizing trojan versions of open-source software during their attack chain to achieve backdoor access. What is the commonly attributed name of the threat actor and an example of one of the open-source software that they have trojanized?.
Computers and Technology
1 answer:
Archy [21]1 year ago
5 0

The commonly attributed name of the threat actor is called ZINC. A wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC.

ZINC weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software installer for these attacks.

Who is ZINC?

ZINC is a nation-state activity group that is highly operational, destructive, and sophisticated. Active since 2009, the activity group gained public attention in 2014 after a successful attack on Sony Pictures Entertainment. ZINC is known to employ a number of custom remote access tools (RATs), including those identified by Microsoft as FoggyBrass and PhantomStar.

ZINC seeks to coerce employees of companies it is attempting to infiltrate into installing seemingly benign programs or opening weaponized documents containing malicious macros.

To know more about Open Source Software(OSS), visit: brainly.com/question/4593389

#SPJ4

You might be interested in
How do you type multiple lines of code into IDLE? My Python environment does not look like the one projected in the lectures. I
natulia [17]
<span> The OSX IDLE provides the functionality of typing multiple lines of the code.  You can find the IDLE environment easily over the internet. </span><span />
5 0
4 years ago
In an array list the time complexity of the remove function is identical to the time complexity of the ____ function.
yaroslaw [1]

Answer:

C. is Full

Explanation:

In an array list the time complexity of the remove function is identical to the time complexity of the ''isFull'' function.

3 0
4 years ago
Read 2 more answers
Your motherboard supports dual channeling and you currently have two slots populated with DIMMs; each module holds 2 GB. You wan
Olenka [21]
One 4-GB DIMM. Dont really have a explanation for it just comes from previous experience
6 0
4 years ago
Read 2 more answers
Explain in your own words why main memory is constrained in a mobile device
iren [92.7K]

Answer:

because it stores the data and downloads and prevent overheating  

Explanation:

3 0
3 years ago
Do you think smartphones will be useful in 5 years?
seropon [69]

Answer:

In 5 years people will be using many things created by technology

8 0
2 years ago
Other questions:
  • Which sentence best describes an activity stream?
    10·2 answers
  • Easy STEAM question :)
    15·2 answers
  • When the word “computer” was coined, what did it mean?
    12·1 answer
  • The part of the computer that contains the brain, or central processing unit, is also known as the A. monitor. B. keyboard. C. m
    13·2 answers
  • The best-known communications protocol is probably smtp, which regulates internet data transport. _________________________
    6·1 answer
  • What is the letter for the trash directory on windows 10?
    13·2 answers
  • Select the pieces of information that are added on to data to get it where it is going.
    5·1 answer
  • Can someone help me with these two
    9·1 answer
  • From which latin word the word computer is derived​
    7·1 answer
  • Hattie uses the line of code num == 7 to assign the number 7 to the variable named num. What correction should be made?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!