One Article Review

Accueil - L'article:
Source Blog.webp AhnLab
Identifiant 8316818
Date de publication 2023-03-08 23:30:00 (vue: 2023-03-09 01:06:33)
Titre CHM Malware Disguised as Security Email from a Korean Financial Company: Redeyes (Scarcruft)
Texte The ASEC (AhnLab Security Emergency response Center) analysis team has discovered that the CHM malware, which is assumed to have been created by the RedEyes threat group (also known as APT37, ScarCruft), is being distributed to Korean users. The team has confirmed that the command used in the “2.3. Persistence” stage of the RedEyes group’s M2RAT malware attack, which was reported back in February, has the same format as the command used in this attack. This information, as well as...
Envoyé Oui
Condensat “2 ahnlab also analysis apt37 asec assumed attack back been being center chm command company: confirmed created discovered disguised distributed email emergency february financial format from group group’s has have information known korean m2rat malware persistence” redeyes reported response same scarcruft security stage team threat used users well which
Tags Malware Threat Cloud
Stories APT 37
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: