Ballistic Bobcat’s Sponsor backdoor – Week in security with Tony Anscombe

Cyber Security

Video

Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States

This week, ESET researchers unveiled their findings about a campaign by the Ballistic Bobcat APT group that deployed a novel backdoor against businesses mainly in Israel. Ballistic Bobcat – previously tracked by ESET Research as APT35/APT42 and also known as Charming Kitten, TA453, or PHOSPHORUS – is a suspected Iran-aligned cyberespionage group that targets education, government, and healthcare organizations, as well as human rights activists and journalists.

Read here about the backdoor, which ESET named Sponsor, as well as how the group looks for targets of opportunity and how organizations can defend themselves against such attacks.

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

Infostealers Cause Surge in Ransomware Attacks, Just One in Three Recover Data
Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution
New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide
CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe
Malicious Actors Spreading False US Voter Registration Breach Claims

Leave a Reply

Your email address will not be published. Required fields are marked *