![]() In addition, Unit 42 discovered that the threat actors created a site that impersonates the Veeam Backup and Recovery software.īesides copying the HTML code to reproduce the genuine sites, the hackers also registered typo-squat 'lookalike' domains to further add authenticity to the malicious site.īlackBerry previously detected the RomCom malware used in attacks against military institutions in Ukraine. ![]() In a new campaign discovered by BlackBerry, the RomCom threat actors were found creating websites that clone official download portals for SolarWinds Network Performance Monitor (NPM), KeePass password manager, and PDF Reader Pro, essentially disguising the malware as legitimate programs. The threat actor behind the RomCom RAT (remote access trojan) has refreshed its attack vector and is now abusing well-known software brands for distribution.
0 Comments
Leave a Reply. |