Source |
The Hacker News |
Identifiant |
8345749 |
Date de publication |
2023-06-15 19:18:00 (vue: 2023-06-15 14:08:55) |
Titre |
VIDAR malware utilisant de nouvelles tactiques pour échapper aux activités de détection et d'anonyme Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities |
Texte |
The threat actors behind the Vidar malware have made changes to their backend infrastructure, indicating attempts to retool and conceal their online trail in response to public disclosures about their modus operandi.
"Vidar threat actors continue to rotate their backend IP infrastructure, favoring providers in Moldova and Russia," cybersecurity company Team Cymru said in a new analysis shared
The threat actors behind the Vidar malware have made changes to their backend infrastructure, indicating attempts to retool and conceal their online trail in response to public disclosures about their modus operandi.
"Vidar threat actors continue to rotate their backend IP infrastructure, favoring providers in Moldova and Russia," cybersecurity company Team Cymru said in a new analysis shared |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
about activities actors analysis anonymize attempts backend behind changes company conceal continue cybersecurity cymru detection disclosures evade favoring indicating infrastructure made malware malware have modus moldova new online operandi providers public response retool rotate russia said shared tactics team the vidar threat trail using vidar |
Tags |
Malware
Threat
|
Stories |
|
Move |
|