◈ Executive Summary
● Detection of attacks using various types of malicious files such as LNK, HWP, HWPX, XLSX, DOCX
● Extension of attacks based on ‘LNK’ by [APT37] group combined with security vulnerabilities
● Extension of attacks using the ‘CVE-2022-41128’ vulnerability disguised as last year’s Itaewon incident response document
● Demand for detection of unknown vulnerability attacks and rapid threat identification based on Genian EDR
Full Report: https://www.genians.co.kr/blog/threat_intelligence/market