MirageFox

  • 22 June 2018
  • 0 replies
  • 21 views

Userlevel 7
Badge +54


 
18th June, 2018 By Eduard Kovacs on Security Week SummaryA cyber-espionage group believed to be operating out of China has developed a new piece of malware that appears to be based on one of the first tools used by the threat actor.
 
The actor is known as APT15, Ke3chang, Mirage, Vixen Panda, Royal APT and Playful Dragon, and its tools are tracked by various cybersecurity companies as Mirage, BS2005, RoyalCLI, RoyalDNS, TidePool, BMW and MyWeb. The group has been known to target organizations in the defense, high tech, energy, government, aerospace, manufacturing and other sectors.
 
Article Link - Read more
Glossary Blog Back to the Malware Manifesto

0 replies

Be the first to reply!

Reply