Chinese state-sponsored espionage campaigns from mid-2024 to late 2025 used three malware strains—Voldemort, HealthKick, and GOVERSHELL—to target Taiwanese semiconductor companies and international think tanks via spear-phishing and DLL sideloading. These attacks leveraged advanced techniques such as using Google Sheets for command and control (C2) and rapidly changing C2 infrastructure, indicating sophisticated development practices including the use of AI tools like ChatGPT.
Read the full article at Malware Analysis, News and Indicators - Latest topics
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.





