Unit 42 researchers observed a series of apparently related attacks against organizations in the Middle East, Africa and the U.S.
The researchers will discuss a set of tools used in the course of the attacks that reveal clues about the threat actors’ activity. Unit 42 team is sharing this research to provide detection, prevention and hunting recommendations to help organizations strengthen their overall security posture. These tools were used to perform the following activities:
- Establish backdoor capabilities
- For command and control (C2)
- Steal user credentials.
- Exfiltrate confidential information
Read more…
Source: Palo Alto Unit 42