Greater than a dozen organizations working in varied verticals have been attacked by the menace actor
This week, ESET researchers revealed their evaluation of beforehand undocumented backdoors and cyberespionage instruments that the POLONIUM APT group has deployed in opposition to targets in Israel. The group has used at the very least seven totally different customized backdoors previously 12 months, and ESET has named 5 beforehand undocumented backdoors with the suffix “-Creep.”
Greater than a dozen organizations working in varied verticals – together with engineering, info know-how, legislation, communications, media, insurance coverage, and social providers – have been attacked by the menace actor. POLONIUM’s customized instruments can take screenshots, log keystrokes, spy through the webcam, exfiltrate recordsdata and carry out different covert actions, all of the whereas misusing standard cloud providers comparable to Dropbox, OneDrive, and Mega for command and management communication.
Watch the video to be taught extra.