Greater than a dozen organizations working in numerous verticals had been attacked by the menace actor
This week, ESET researchers revealed their evaluation of beforehand undocumented backdoors and cyberespionage instruments that the POLONIUM APT group has deployed towards targets in Israel. The group has used at the least seven completely different customized backdoors up to now 12 months, and ESET has named 5 beforehand undocumented backdoors with the suffix “-Creep.”
Greater than a dozen organizations working in numerous verticals – together with engineering, info expertise, legislation, communications, media, insurance coverage, and social providers – had been attacked by the menace actor. POLONIUM’s customized instruments can take screenshots, log keystrokes, spy through the webcam, exfiltrate recordsdata and carry out different covert actions, all of the whereas misusing widespread cloud providers akin to Dropbox, OneDrive, and Mega for command and management communication.
Watch the video to be taught extra.