Ongoing Stayin' Alive Attacks Target Asian Telecoms and Governments

1 min read
Source: The Hacker News
Ongoing Stayin' Alive Attacks Target Asian Telecoms and Governments
Photo: The Hacker News
TL;DR Summary

ToddyCat, an advanced persistent threat (APT) actor, has been linked to a new set of malicious tools for data exfiltration, revealing insights into their tactics and capabilities. Kaspersky discovered this new arsenal, which includes loaders, a file collection tool, a Dropbox uploader, and an archive exfiltration tool. ToddyCat also utilizes custom scripts, a passive backdoor, Cobalt Strike, and compromised credentials for lateral movement. Check Point has revealed that government and telecom entities in Asia have been targeted by a similar campaign using "disposable" malware, with infrastructure overlapping with ToddyCat's operations.

Share this article

Reading Insights

Total Reads

0

Unique Readers

1

Time Saved

1 min

vs 2 min read

Condensed

73%

33190 words

Want the full story? Read the original article

Read on The Hacker News