
The first backdoor which utilizes the ‘Sony rootkit‘ was detected today. We’ve classified this malicious program as Backdoor.Win32.Breplibot.b.
We’re analyzing the progam at the moment and will have more information soon. Watch this space.
minute read
The first backdoor which utilizes the ‘Sony rootkit‘ was detected today. We’ve classified this malicious program as Backdoor.Win32.Breplibot.b.
We’re analyzing the progam at the moment and will have more information soon. Watch this space.
According to Kaspersky, Librarian Ghouls APT continues its series of attacks on Russian entities. A detailed analysis of a malicious campaign utilizing RAR archives and BAT scripts.
Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.
MysterySnail RAT attributed to IronHusky APT group hasn’t been reported since 2021. Recently, Kaspersky GReAT detected new versions of this implant in government organizations in Mongolia and Russia.
Kaspersky researchers analyze GOFFEE’s campaign in H2 2024: the updated infection scheme, new PowerModul implant, switch to a binary Mythic agent.
Sony rootkit backdoor program