The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine
https://www.welivesecurity.com/en/videos/dinodasrat-used-governmental-entity-guayana-week-security-tony-anscombe/ https://www.welivesecurity.com/en/videos/dinodasrat-used-governmental-entity-guayana-week-security-tony-anscombe/ DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine Fri, 06 Oct 2023 12:15:00 +0000