- Jonathan Feakins
- August 29, 2025
Loading
Key takeaways <ul><li>The TAOTH campaign leveraged an abandoned Sogou Zhuyin IME update server and spear-phishing operations to deliver multiple malware familiesincluding TOSHIS, C6DOOR, DESFY, and … [+3674 chars] Show more...
The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia.
0 Comments:
Leave a Reply