Purple Fox - The threat actors have noticed that the attacks generally take advantage of legitimate software for implementing malicious payloads. The vulnerability has been named CVE-2021-1732, and this vulnerability generally optimizes rootkit capabilities that are leveraged in their attacks. #windows #malware #worm #cyber #software #threats #powershell #vuln #telegram #rootkit #informatique
https://blog.minerva-labs.com/malicious-telegram-installer-drops-purple-fox-rootkit