In particular, the group targeted government institutions, religious organizations, electronics manufacturers, and universities. The research arm observed that the victims of Gelsemium’s campaigns are located in East Asia and the Middle East. The earliest version of the malware was traced back to 2014. In its investigation of multiple campaigns attributed to the Gelsemium group since mid-2020, ESET Research found a new version of the group’s main malware, Gelsevirine, which the firm describes as complex and modular. A research arm of an Internet security company has tracked down a strain of malware attacks from a cyberespionage group, the latest of which is believed to be a supply-chain attack against an Android emulator for personal computers (PCs) and Mac devices last February.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |