MalKamak APT’s ShellClient RAT: Inside Operation GhostShell
Introduction to Malware Binary Triage (IMBT) Course
Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor.
Enroll Now and Save 10%: Coupon Code MWNEWS10
Note: Affiliate link – your enrollment helps support this platform at no extra cost to you.
MalKamak group has been active since at least 2018 and was observed in a targeted espionage campaign that peaked in July 2021, focusing primarily on theaerospace and telecommunications sectors in the Middle East (with additional victims in the U.S., Russia, and Europe). The name MalKamak is derived from Kamak, an ancient Persian mythological creature believed to be responsible for droughts and spreading chaos, reflecting the group’s disruptive capabilities.
Article Link: https://www.picussecurity.com/resource/blog/malkamak-apts-shellclient-rat-inside-operation-ghostshell
1 post - 1 participant
Malware Analysis, News and Indicators - Latest topics
