New IDAT Loader Version Uses Steganography to Push Remcos RAT

The attackers employed sophisticated techniques such as code injection, execution modules, and dynamic loading of Windows API functions to evade detection by automated security products.

>>More