Attackers are finding more and more ways to exploit weaknesses, and now, we see the BLYPT backdoor family using blobs in its routines. Who are the targets of this new targeted attack campaign and how can it get in?
Attackers are finding more and more ways to exploit weaknesses, and now, we see the BLYPT backdoor family using blobs in its routines. Who are the targets of this new targeted attack campaign and how can it get in?
Ever heard of an attack that plays possum? The Siesta campaign gets in mostly via spear-phishing emails and then lies dormant for varied time periods before gathering information.
Whether considered advanced persistent threats (APTs) or malware-based espionage attacks, successful and long-term compromises of high-value organizations and enterprises worldwide by a consistent set of campaigns cannot be ignored.
The Taidoor campaign primarily targeted government organizations located in Taiwan. Trend Micro Research was able to develop indicators of compromise useful in determining if an attack is underway in an enterprise.
The IXESHE attackers are notable for their use of compromised machines within a target’s internal network as C&C servers. While the malware used in the attacks were not very complicated by nature, these proved very effective. This campaign remains an activ
The Taidoor campaign primarily targeted government organizations located in Taiwan. Trend Micro Research was able to develop indicators of compromise useful in determining if an attack is underway in an enterprise.
The threat actors behind “Lurid Downloader” launched 301 malware campaigns that targeted entities in specific countries or geographic regions and added a means to track the success of each one.