Identifying state-sponsored malware increasingly difficult ZDNet Having capabilities to gather data stealthily, or having specific victims are two key characteristics present in malware used for state-sponsored attacks, but it is increasingly hard to tell them apart from tools by cybercriminals, let alone attribute ... |