ToddyCat is making holes in your infrastructure
We continue to report on the APT group ToddyCat. This time, we’ll talk about traffic tunneling, constant access to a target infrastructure and data extraction from hosts.
Your antivirus vendor’s technical support can provide help in combating threats.
If you are experiencing problems with your security solution, contact your vendor’s technical support.
If you are looking for a description of a malicious or potentially unwanted program, and cannot find it on the site, you can ask us to write and publish a description.
If you have identified a vulnerability in a Kaspersky Lab product, please send details to vulnerability@kaspersky.com.
If you have identified a vulnerability in this or any Kaspersky Lab site, please send details to websecurity@kaspersky.com.
We cannot answer any queries on how to deal with malware or product functionality.
We continue to report on the APT group ToddyCat. This time, we’ll talk about traffic tunneling, constant access to a target infrastructure and data extraction from hosts.
New unattributed DuneQuixote campaign targeting entities in the Middle East employs droppers disguised as Total Commander installer and CR4T backdoor in C and Go.
In this report Kaspersky researchers provide an analysis of the previously unknown HrServ web shell, which exhibits both APT and crimeware features and has likely been active since 2021.
Asian APT groups target various organizations from a multitude of regions and industries. We created this report to provide the cybersecurity community with the best-prepared intelligence data to effectively counteract Asian APT groups.