![]() ![]() "The ShellClient RAT has been under ongoing development since at least 2018, with several iterations that introduced new functionalities, while it evaded antivirus tools and managed to remain undetected and publicly unknown," researchers Tom Fakterman, Daniel Frank, Chen Erlich, and Assaf Dahan said in a technical deep dive published today. The first sign of the attacks was observed in July 2021 against a handpicked set of victims, indicating a highly targeted approach. To learn more about the DBX Dev Day in each city and to sign up to attend, head to the event pages linked below.Details have emerged about a new cyber espionage campaign directed against the aerospace and telecommunications industries, primarily in the Middle East, with the goal of stealing sensitive information about critical assets, organizations' infrastructure, and technology while remaining in the dark and successfully evading security solutions.īoston-based cybersecurity company Cybereason dubbed the attacks " Operation Ghostshell," pointing out the use of a previously undocumented and stealthy remote access trojan (RAT) called ShellClient that's deployed as the main spy tool of choice. Q&A and office hours where you can get hands on help building your integration, or learn about joint marketing and partnership opportunities. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |