Security News > 2024 > June > Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS

2024-06-13 10:26
Threat actors with ties to Pakistan have been linked to a long-running malware campaign dubbed Operation Celestial Force since at least 2018. The activity, still ongoing, entails the use of an Android malware called GravityRAT and a Windows-based malware loader codenamed HeavyLift, according to Cisco Talos, which are administered using another standalone tool referred to as GravityAdmin. The
News URL
https://thehackernews.com/2024/06/pakistan-linked-malware-campaign.html
Related news
- APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware (source)
- North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS (source)
- Crypto-stealing iOS, Android malware found on App Store, Google Play (source)
- New Microsoft script updates Windows media with bootkit malware fixes (source)
- FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux (source)
- XCSSET macOS malware returns with first new version since 2022 (source)
- Microsoft spots XCSSET macOS malware variant used for crypto theft (source)
- Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics (source)
- The XCSSET info-stealing malware is back, targeting macOS users and devs (source)
- New FrigidStealer Malware Targets macOS Users via Fake Browser Updates (source)