Security News > 2024 > June > Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS
![Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS](/static/build/img/news/pakistan-linked-malware-campaign-evolves-to-target-windows-android-and-macos-medium.jpg)
2024-06-13 10:26
Threat actors with ties to Pakistan have been linked to a long-running malware campaign dubbed Operation Celestial Force since at least 2018. The activity, still ongoing, entails the use of an Android malware called GravityRAT and a Windows-based malware loader codenamed HeavyLift, according to Cisco Talos, which are administered using another standalone tool referred to as GravityAdmin. The
News URL
https://thehackernews.com/2024/06/pakistan-linked-malware-campaign.html
Related news
- Beware: These Fake Antivirus Sites Spreading Android and Windows Malware (source)
- New Wpeeper Android malware hides behind hacked WordPress sites (source)
- Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers (source)
- Finland warns of Android malware attacks breaching bank accounts (source)
- Microsoft fixes Windows zero-day exploited in QakBot malware attacks (source)
- Android 15, Google Play get new anti-malware and anti-fraud features (source)
- Android 15, Google Play Protect get new anti-malware and anti-fraud features (source)
- Android malware Grandoreiro returns after police disruption (source)
- New Cross-Platform Malware 'Noodle RAT' Targets Windows and Linux Systems (source)
- Singapore Police Extradites Malaysians Linked to Android Malware Fraud (source)