One Article Review

Accueil - L'article:
Source CSO.webp CSO
Identifiant 8302529
Date de publication 2023-01-19 04:27:00 (vue: 2023-01-19 13:08:57)
Titre Chinese hackers targeted Iranian government entities for months: Report
Texte Chinese advanced persistent threat actor, Playful Taurus, targeted several Iranian government entities between July and December 2022, according to a Palo Alto Networks report. The Chinese threat actor also known as APT15, KeChang, NICKEL, BackdoorDiplomacy, and Vixen Panda, was observed attempting to connect government domains to malware infrastructure previously associated with the APT group, according to the report.“Playful Taurus continues to evolve their tactics and their tooling. Recent upgrades to the Turian backdoor and new C2 infrastructure suggest that these actors continue to see success during their cyber espionage campaigns,” Palo Alto Networks said in a blog. To read this article in full, please click here
Envoyé Oui
Condensat 2022 according actor actors advanced also alto apt apt15 article associated attempting backdoor backdoordiplomacy between blog campaigns chinese click connect continue continues cyber december domains during entities espionage evolve full government group hackers here infrastructure iranian july kechang known malware months: networks new nickel observed palo panda persistent playful please previously read recent report said see several success suggest tactics targeted taurus these threat tooling turian upgrades vixen  the  to “playful
Tags Malware Threat
Stories APT 15 APT 25
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: