The operation uses social engineering and technical evasion techniques, delivering malware through trojanized HWP documents.

The operation uses social engineering and technical evasion techniques, delivering malware through trojanized HWP documents.