Ballistic Bobcat’s Sponsor backdoor – Week in security with Tony Anscombe

Cyber Security

Video

Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States

This week, ESET researchers unveiled their findings about a campaign by the Ballistic Bobcat APT group that deployed a novel backdoor against businesses mainly in Israel. Ballistic Bobcat – previously tracked by ESET Research as APT35/APT42 and also known as Charming Kitten, TA453, or PHOSPHORUS – is a suspected Iran-aligned cyberespionage group that targets education, government, and healthcare organizations, as well as human rights activists and journalists.

Read here about the backdoor, which ESET named Sponsor, as well as how the group looks for targets of opportunity and how organizations can defend themselves against such attacks.

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

Palo Alto Networks Confirms New Zero-Day Being Exploited by Threat Actors
Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform
Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering
New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration
EU Ramps Up Cyber Resilience with Major Crisis Simulation Exercise

Leave a Reply

Your email address will not be published. Required fields are marked *