Phishing Beyond Emails: How Compromised Installers Threaten Automotive Software Supply Chains
We examine how a signed Windows installer was used to deploy Redline Stealer malware, successfully bypassing traditional defenses. The incident reveals critical blind spots in automotive cybersecurity and highlights the need for zero-trust principles across the entire software supply chain.