MuddyWater’s Sneaky New Tactic: Hijacking RMM Software for Espionage

MuddyWater attacks
Image: 360 Advanced Threat Research Institute