Security News > 2020 > March > Unknown ‘WildPressure’ Malware Campaign Lets Off Steam in Middle East
A malware campaign that shares no known similarities to previous attacks has been uncovered, targeting organizations in the Middle East.
Dubbed "WildPressure," the campaign used a previously unknown malware that researchers named Milum, after the C++ class names inside the code.
According to researchers at Kaspersky, which sinkholed one of the WildPressure command-and-control domains in September, the vast majority of visitor IPs to the operators' malicious infrastructure were from the Middle East, with the rest being made up of scanners, TOR exit nodes or VPN connections.
The malware carries out basic system reconnaissance, including inventorying the types of files housed on infected machines, according to the research.
The C++ code approach used by the malware authors is fairly generic, Legezo wrote.
News URL
https://threatpost.com/wildpressure-malware-campaign-middle-east/154101/