Ongoing Stayin' Alive Attacks Target Asian Telecoms and Governments

TL;DR Summary
ToddyCat, an advanced persistent threat (APT) actor, has been linked to a new set of malicious tools for data exfiltration, revealing insights into their tactics and capabilities. Kaspersky discovered this new arsenal, which includes loaders, a file collection tool, a Dropbox uploader, and an archive exfiltration tool. ToddyCat also utilizes custom scripts, a passive backdoor, Cobalt Strike, and compromised credentials for lateral movement. Check Point has revealed that government and telecom entities in Asia have been targeted by a similar campaign using "disposable" malware, with infrastructure overlapping with ToddyCat's operations.
- Researchers Unveil ToddyCat's New Set of Tools for Data Exfiltration The Hacker News
- ToddyCat hackers use 'disposable' malware to target Asian telecoms BleepingComputer
- Chinese 'Stayin' Alive' Attacks Dance Onto Targets With Dumb Malware DARKReading
- Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants The Hacker News
- Stayin' Alive - Targeted Attacks Against Telecoms and Government Ministries in Asia - Check Point Research Check Point Research
- View Full Coverage on Google News
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
1 min
vs 2 min read
Condensed
73%
331 → 90 words
Want the full story? Read the original article
Read on The Hacker News