@AAKL@infosec.exchange
When executed, the email payload "ran Python-based code in memory (MITRE T1059.006). No persistence mechanisms were observed; instead, LameHug performed a rapid βsmash-and-grabβ collection before exiting, consistent with espionage-driven objectives focused on quick exfiltration."
Picus: LameHug: The First Publicly Documented Case of a Malware Integrating a LLM https://www.picussecurity.com/resource/blog/lamehug-the-first-publicly-documented-case-of-a-malware-integrating-a-llm #cybersecurity #infosec #LLM #Google #OpenAI #AI #Perplexity #phishing #espionage