Ballistic Bobcat’s Sponsor backdoor – Week in security with Tony Anscombe

Cyber Security

Video

Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States

This week, ESET researchers unveiled their findings about a campaign by the Ballistic Bobcat APT group that deployed a novel backdoor against businesses mainly in Israel. Ballistic Bobcat – previously tracked by ESET Research as APT35/APT42 and also known as Charming Kitten, TA453, or PHOSPHORUS – is a suspected Iran-aligned cyberespionage group that targets education, government, and healthcare organizations, as well as human rights activists and journalists.

Read here about the backdoor, which ESET named Sponsor, as well as how the group looks for targets of opportunity and how organizations can defend themselves against such attacks.

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

Italy’s Data Protection Watchdog Issues €15m Fine to OpenAI Over ChatGPT Probe
LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages
Sophisticated TA397 Malware Targets Turkish Defense Sector
CISA and EPA Warn of Cyber Risks to Water System Interfaces
LockBit Admins Tease a New Ransomware Version

Leave a Reply

Your email address will not be published. Required fields are marked *