Pied Piper
2:30
Wednesday

Pied Piper campaign targets food chains, suppliers

The Trojan gives threat actors complete access to the victim's machine, allowing them to steal files, credentials, collect screen grabs and access the camera and microphone.

Related topics