After connecting with researchers, the hackers would ask them if they wanted to collaborate on cyber-vulnerability research and share a tool that contained a code designed to install malicious software on the targets’ computers, which would then allow the hackers to take control of the device and steal information from it.
Several targeted researchers were compromised after following a Twitter link to a blog set up by the hackers, Weidemann said.
“At the time of these visits, the victim…
Source link