Steganography used in campaigns targeting the Middle East and Africa. Supply chain attack, possibly from Chinese intelligence services. Ransomware as a cover for espionage. New Lazarus activity: bring-your-own-vulnerable-driver.
New Lazarus activity: bring-your-own-vulnerable-driver.