Source |
The Hacker News |
Identifiant |
8651925 |
Date de publication |
2025-02-28 15:06:00 (vue: 2025-02-28 11:08:19) |
Titre |
Le loup-garou collant utilise un implant sans papiers pour déployer le voleur de Lumma en Russie et en Biélorussie Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus |
Texte |
L'acteur de menace connu sous le nom de loup-garou collant a été lié à des attaques ciblées principalement en Russie et en Biélorussie dans le but de livrer le malware du voleur de Lumma au moyen d'un implant préalable sans papiers.
La société de cybersécurité Kaspersky suit l'activité sous le nom de Angry Likho, qui, selon elle, a une "ressemblance forte" à Awaken Likho (aka Core Werewolf, Gamacopy, et
The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant.
Cybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a "strong resemblance" to Awaken Likho (aka Core Werewolf, GamaCopy, and |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
activity actor aim angry attacks awaken bears been belarus company core cybersecurity delivering deploy gamacopy has implant kaspersky known likho linked lumma malware means name previously primarily resemblance russia said stealer sticky strong targeted threat tracking under undocumented uses werewolf which |
Tags |
Malware
Threat
|
Stories |
|
Move |
|