Security News > 2020 > November > New Jupyter malware steals browser data, opens backdoor
While Jupyter's purpose is to collect data from various software, the malicious code supporting its delivery can also be used to create a backdoor on an infected system.
A variant of the malware emerged during an incident response engagement in October at a University in the U.S. But forensic data indicates that earlier versions have been developed since May. Researchers at cybersecurity company Morphisec discovered that the developers of the attack kit were highly active, some components receiving more than nine updates in a single month.
The constant modification of the code allows it to evade detection and enables Jupyter to collect more data from compromised systems.
Morphisec's report covers technical details for the tools and scripts used in a Jupyter attack, tracing the evolution of the components and exposing their inner workings.
The link to Russian-speaking developers is stronger than this as Morphisec noticed a typo that is consistent to the Jupyter name converted from Russian.