This blog discusses the steganography, cloud abuse, and email-based backdoors used against the Ukrainian defense supply chain in the latest Pawn Storm campaign that TrendAI™ Research observed and analyzed.
Attribution analysis
Based on technical artifacts, infrastructure overlaps, and victimology, TrendAI Research attributes this campaign toPawn Storm withhigh confidence. This assessment is significan… [+9281 chars]





