Cybersecurity

New TetrisPhantom Hackers Steal Data From Secure USB Drives on Government Systems

The attack involves the deployment of a trojanized version of the UTetris application, which acts as a loader for malware and facilitates the spread of the attack to potentially air-gapped systems.