By Ionut Arghire on July 18, 2019
A recently discovered ongoing campaign attributed to the StrongPity threat actor abuses malicious WinBox installers to infect victims, AT&T’s Alien Labs security researchers reveal.
Initially detailed in 2016, the StrongPity threat group was observed targeting users in Europe, Northern Africa and the Middle East for cyber-espionage purposes via watering holes, poisoned installers, and malware.
The new campaign, which appears to have started in the second half of 2018, uses new malware and infrastructure, but also employs techniques previously associated with the group, including the use of malicious WinRAR, and other trusted software to compromise targets.
Full Article.
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.