Brutkey

AA
@AAKL@infosec.exchange

When executed, the email payload "ran Python-based code in memory (MITRE T1059.006). No persistence mechanisms were observed; instead, LameHug performed a rapid β€œsmash-and-grab” collection before exiting, consistent with espionage-driven objectives focused on quick exfiltration."

Picus: LameHug: The First Publicly Documented Case of a Malware Integrating a LLM
https://www.picussecurity.com/resource/blog/lamehug-the-first-publicly-documented-case-of-a-malware-integrating-a-llm #cybersecurity #infosec #LLM #Google #OpenAI #AI #Perplexity #phishing #espionage