"People who wish to use these services have to resort to indirect means of obtaining them," the researchers said. The campaign, like a similar malicious cyber operation that came to light last year, is geared towards Chinese-speaking users, primarily motivated by the fact that both Telegram and WhatsApp are blocked in the country. It's also worth pointing out that these clusters, despite following an identical modus operandi, represent disparate sets of activity likely developed by different threat actors. Improve your business security with our upcoming expert-led cybersecurity webinar: Explore Identity Perimeter strategies! Don't Miss Out – Save Your Seat!Īll the analyzed RAT samples are based on the publicly available Gh0st RAT, barring one, which employs more anti-analysis runtime checks during its execution and uses the HP-socket library to communicate with its server. ![]() Learn to Secure the Identity Perimeter - Proven Strategies
0 Comments
Leave a Reply. |