Eastern European Energy and Defense Firms Targeted With MATA Backdoor
The attackers employed sophisticated techniques, including exploiting a vulnerability in Internet Explorer and using specialized malware modules for data exfiltration, highlighting the increasing complexity of targeted attacks.