OneClik Malware Targets Energy Sector Using ClickOnce and Cloud Evasion

TL;DR Summary
Cybersecurity researchers have uncovered a campaign called OneClik that targets energy sector organizations using malicious ClickOnce applications and custom Golang backdoors, likely linked to Chinese threat actors, employing sophisticated evasion techniques and multi-protocol command-and-control communication.
- OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors The Hacker News
- Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks BleepingComputer
- OneClik APT campaign targets energy sector with stealthy backdoors Security Affairs
- Trellix details OneClik malware campaign targeting energy, oil and gas sectors using ClickOnce, cloud evasion Industrial Cyber
- OneClik Malware Slips In via ClickOnce, Is Your Grid Safe? The420.in
Reading Insights
Total Reads
0
Unique Readers
0
Time Saved
4 min
vs 5 min read
Condensed
96%
882 → 35 words
Want the full story? Read the original article
Read on The Hacker News