A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe.
The cyberespionage malware—traced to Turla APT with "medium-to-low level of confidence" based on the history of compromised victims—spread via an initial dropper that masks itself as
Top News
-
Tenable Acquires Eureka Security To Provide Data Security Across Infrastructure
Tenable® Holdings, Inc., a leading Exposure Management company, has announced a definitive agreement to acquire Eureka Security, Inc., a prominent...
-
SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with a malware called...
-
FBI thu giữ 7.000 khóa giải mã LockBit, sẵn sàng hỗ trợ nạn nhân ransomware
FBI kêu gọi nạn nhân trong các vụ tấn công mã độc đòi tiền chuộc (ransomware) của LockBit lên tiếng sau khi tiết lộ đã thu hơn 7.000 khóa giải...