TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents


Key takeaways <ul><li>The TAOTH campaign leveraged an abandoned Sogou Zhuyin IME update server and spear-phishing operations to deliver multiple malware familiesincluding TOSHIS, C6DOOR, DESFY, and … [+3674 chars] Show more...

The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia.

author

Nick Dai

0 Comments:

Leave a Reply

Your email address will not be published. Required fields are marked *

you may also like

  • Hessie Jones, Contributor, Hessie Jones, Contributor https://www.forbes.com/sites/hessiejones/
  • August 29, 2025
Two Thirds Of Canadians Are Divided On Whether AI Is...