![](https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/11/11130233/securelist_abs_2-1200x600.jpg)
The first backdoor which utilizes the ‘Sony rootkit‘ was detected today. We’ve classified this malicious program as Backdoor.Win32.Breplibot.b.
We’re analyzing the progam at the moment and will have more information soon. Watch this space.
minute read
The first backdoor which utilizes the ‘Sony rootkit‘ was detected today. We’ve classified this malicious program as Backdoor.Win32.Breplibot.b.
We’re analyzing the progam at the moment and will have more information soon. Watch this space.
Kaspersky discovered a new APT CloudSorcerer targeting Russian government entities and using cloud services as C2, just like the CloudWizard actor.
The report features the most significant developments relating to APT groups in Q1 2024, including the new malware campaigns DuneQuixote and Durian, and hacktivist activity.
We continue to report on the APT group ToddyCat. This time, we’ll talk about traffic tunneling, constant access to a target infrastructure and data extraction from hosts.
New unattributed DuneQuixote campaign targeting entities in the Middle East employs droppers disguised as Total Commander installer and CR4T backdoor in C and Go.
Sony rootkit backdoor program