Security News > 2024 > June > Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS
2024-06-13 10:26
Threat actors with ties to Pakistan have been linked to a long-running malware campaign dubbed Operation Celestial Force since at least 2018. The activity, still ongoing, entails the use of an Android malware called GravityRAT and a Windows-based malware loader codenamed HeavyLift, according to Cisco Talos, which are administered using another standalone tool referred to as GravityAdmin. The
News URL
https://thehackernews.com/2024/06/pakistan-linked-malware-campaign.html
Related news
- Russia targets Ukrainian conscripts with Windows, Android malware (source)
- Microsoft Office 2024 now available for Windows and macOS users (source)
- TrickMo malware steals Android PINs using fake lock screen (source)
- North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware (source)
- macOS HM Surf vuln might already be under exploit by major malware family (source)
- Android malware "FakeCall" now reroutes bank calls to attackers (source)
- New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls (source)
- New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers (source)
- New SteelFox malware hijacks Windows PCs using vulnerable driver (source)
- North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS (source)