Editor’s note: This report was authored by Thassanai McCabe.
Key PointsAttackers scaled up trust exploitation, led by “BaoLoader” malware, which abused code-signing certificates instead of relying on novel exploits.
Initial access remained human-driven, with spearphishing links, spearphishing attachments, and drive-by compromise dominat...
