Government ❯ Cybersecurity Policy ❯ Threat Assessment
Vietnamese Cybercriminals
The infostealer uses DLL sideloading through signed applications with decoy files before exfiltrating credentials via Telegram bots