Threat Group: Various Cybercriminal Actors
Threat Type: Information-Stealing Malware
Exploited Vulnerabilities: Primarily delivered via phishing emails and "free" software disguised as malware; also targets vulnerabilities in Microsoft Office to execute malicious code.
Malware Used: HawkEye, also known as PredatorPain
Threat Score: High (8.5/10) — Given its long