Security News > 2020 > March > Unknown ‘WildPressure’ Malware Campaign Lets Off Steam in Middle East

Unknown ‘WildPressure’ Malware Campaign Lets Off Steam in Middle East
2020-03-24 21:01

A malware campaign that shares no known similarities to previous attacks has been uncovered, targeting organizations in the Middle East.

Dubbed "WildPressure," the campaign used a previously unknown malware that researchers named Milum, after the C++ class names inside the code.

According to researchers at Kaspersky, which sinkholed one of the WildPressure command-and-control domains in September, the vast majority of visitor IPs to the operators' malicious infrastructure were from the Middle East, with the rest being made up of scanners, TOR exit nodes or VPN connections.

The malware carries out basic system reconnaissance, including inventorying the types of files housed on infected machines, according to the research.

The C++ code approach used by the malware authors is fairly generic, Legezo wrote.


News URL

https://threatpost.com/wildpressure-malware-campaign-middle-east/154101/