Advanced Persistent Threat (APT) groups are constantly evolving their techniques to evade detection. Kaspersky Labs has recently uncovered a sophisticated method employed by the ToddyCat group: hiding their malicious activity within the context of legitimate security software. In early 2024, Kaspersky’s investigation into ToddyCat incidents revealed a suspicious file named >>version.dll<< on multiple devices. This [...] First seen on securityonline.info Jump to article: securityonline.info/cve-2024-11859-toddycat-group-hides-malware-in-esets-scanner-to-bypass-security/