Security News > 2024 > June > Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS
2024-06-13 10:26
Threat actors with ties to Pakistan have been linked to a long-running malware campaign dubbed Operation Celestial Force since at least 2018. The activity, still ongoing, entails the use of an Android malware called GravityRAT and a Windows-based malware loader codenamed HeavyLift, according to Cisco Talos, which are administered using another standalone tool referred to as GravityAdmin. The
News URL
https://thehackernews.com/2024/06/pakistan-linked-malware-campaign.html
Related news
- Russia targets Ukrainian conscripts with Windows, Android malware (source)
- Windows, macOS users targeted with crypto-and-info-stealing malware (source)
- Android malware "FakeCall" now reroutes bank calls to attackers (source)
- New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls (source)
- New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers (source)
- New SteelFox malware hijacks Windows PCs using vulnerable driver (source)
- North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS (source)
- North Korean hackers use new macOS malware against crypto firms (source)
- New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus (source)
- North Korean Hackers Target macOS Using Flutter-Embedded Malware (source)