Source |
The Hacker News |
Identifiant |
8484148 |
Date de publication |
2024-04-17 19:02:00 (vue: 2024-04-17 14:07:31) |
Titre |
Russian APT déploie de nouveaux \\ 'Kapeka \\' Backdoor dans les attaques d'Europe de l'Est Russian APT Deploys New \\'Kapeka\\' Backdoor in Eastern European Attacks |
Texte |
Une porte dérobée "flexible" sans documentation, sans documentation, appelée & nbsp; kapeka & nbsp; a été "sporadiquement" observée dans les cyberattaques ciblant l'Europe de l'Est, notamment l'Estonie et l'Ukraine, depuis au moins au milieu de 2022.
Les résultats proviennent de la société de cybersécurité finlandaise avec Sésence, qui a attribué le groupe de logiciels malveillants au groupe avancé de menace persistante avancée (APT) suivi comme & nbsp; Sandworm & nbsp; (AKA APT44 ou
A previously undocumented "flexible" backdoor called Kapeka has been "sporadically" observed in cyber attacks targeting Eastern Europe, including Estonia and Ukraine, since at least mid-2022.
The findings come from Finnish cybersecurity firm WithSecure, which attributed the malware to the Russia-linked advanced persistent threat (APT) group tracked as Sandworm (aka APT44 or |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2022 advanced apt apt44 as sandworm attacks attributed backdoor been called kapeka has come cyber cybersecurity deploys eastern estonia europe european findings finnish firm flexible from group including kapeka least linked malware mid new observed persistent previously russia russian since sporadically targeting threat tracked ukraine undocumented which withsecure |
Tags |
Malware
Threat
|
Stories |
|
Move |
|