Winnti Malware Gets into Pharmaceutical Business

Winnti Malware Gets into Pharmaceutical Business

Operators sign rootkit with stolen certificate

Skeleton Key Malware Active for Two Years

Skeleton Key Malware Active for Two Years

Threat actors use it with Winnti to compromise networks

Winnti Backdoor Created with Aheadlib to Mimic Legitimate System Library

Winnti Backdoor Created with Aheadlib to Mimic Legitimate System Library

Trend Micro experts have analyzed this interesting threat