The state-sponsored hackers deployed custom tools and stayed dormant in the compromised environments for months.
Recent social engineering schemes involving WordPress and Microsoft’s Windows Terminal show that this relatively basic tactic is a growing threat.