Pied Piper
2:30
Dec 5, 2018

Pied Piper campaign targets food chains, suppliers

The Trojan gives threat actors complete access to the victim's machine, allowing them to steal files, credentials, collect screen grabs and access the camera and microphone.

Related topics