![](https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/11/11130459/securelist_abs_10-1200x600.jpg)
Following on from Vitaly’s post about the new Gpcode variant, I just thought I’d remind everyone to back up their data.
That way, if you do fall victim to Gpcode and your files get encrypted, at least you won’t have lost any valuable information.
minute read
Following on from Vitaly’s post about the new Gpcode variant, I just thought I’d remind everyone to back up their data.
That way, if you do fall victim to Gpcode and your files get encrypted, at least you won’t have lost any valuable information.
Kaspersky discovered a new APT CloudSorcerer targeting Russian government entities and using cloud services as C2, just like the CloudWizard actor.
The report features the most significant developments relating to APT groups in Q1 2024, including the new malware campaigns DuneQuixote and Durian, and hacktivist activity.
We continue to report on the APT group ToddyCat. This time, we’ll talk about traffic tunneling, constant access to a target infrastructure and data extraction from hosts.
New unattributed DuneQuixote campaign targeting entities in the Middle East employs droppers disguised as Total Commander installer and CR4T backdoor in C and Go.
A cautionary reminder