Government ❯ Cybersecurity Policy ❯ Threat Intelligence ❯ Attack Vectors
Researchers say the campaign deploys PlugX via a signed Canon utility using DLL sideloading.