Ballistic Bobcat’s Sponsor backdoor – Week in security with Tony Anscombe

Cyber Security

Video

Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States

This week, ESET researchers unveiled their findings about a campaign by the Ballistic Bobcat APT group that deployed a novel backdoor against businesses mainly in Israel. Ballistic Bobcat – previously tracked by ESET Research as APT35/APT42 and also known as Charming Kitten, TA453, or PHOSPHORUS – is a suspected Iran-aligned cyberespionage group that targets education, government, and healthcare organizations, as well as human rights activists and journalists.

Read here about the backdoor, which ESET named Sponsor, as well as how the group looks for targets of opportunity and how organizations can defend themselves against such attacks.

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

UK’s AI Safety Institute Rebrands Amid Government Strategy Shift
No, you’re not fired – but beware of job termination scams
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos
Pro-Russia Hackers NoName057(16) Hit Italian Banks and Airports

Leave a Reply

Your email address will not be published. Required fields are marked *