Sednit update: How Fancy Bear Spent the Year

ThreatsCybercrime

If the intended potential victim opens the document and makes the foolhardy chose to ignore the warnings, the above script is executed and the Seduploader binary is downloaded from the C&C server and executed on the target’s system. This is only a brief overview of how the Sednit operators have been….