China linked Silk Typhoon targeted diplomats by hijacking web traffic
The China-linked APT group Silk Typhoon targeted diplomats by hijacking web traffic to deliver malware disguised as an Adobe Plugin update. The attackers used an adversary-in-the-middle technique to redirect web traffic and deliver the malware, bypassing security tools and maintaining stealth. Google’s Threat Intelligence Group published indicators of compromise and YARA rules for detecting the malware.