Operation CuckooBees offers a glimpse into the evolving Winnti intrusion playbook. The threat employed an elaborate, multi-stage infection chain that was critical to enabling the group to remain undetected for so long. Winnti leveraged both known and previously undocumented malware techniques, including digitally signed kernel-level #windows rootkits. « Cyber espionage doesn't usually generate the same degree of panic or media attention as other cyberattacks, but the lack of attention doesn't make it any less dangerous. » #cyber #economic #espionage #industrial #malware #threats #innovative #informatique