MalKamak APT’s ShellClient RAT: Inside Operation GhostShell

Introduction to Malware Binary Triage (IMBT) Course

Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor.

Enroll Now and Save 10%: Coupon Code MWNEWS10

Note: Affiliate link – your enrollment helps support this platform at no extra cost to you.

MalKamak APT’s ShellClient RAT: Inside Operation GhostShell

MalKamak group has been active since at least 2018 and was observed in a targeted espionage campaign that peaked in July 2021, focusing primarily on theaerospace and telecommunications sectors in the Middle East (with additional victims in the U.S., Russia, and Europe). The name MalKamak is derived from Kamak, an ancient Persian mythological creature believed to be responsible for droughts and spreading chaos, reflecting the group’s disruptive capabilities.

Article Link: https://www.picussecurity.com/resource/blog/malkamak-apts-shellclient-rat-inside-operation-ghostshell

1 post - 1 participant

Read full topic



Malware Analysis, News and Indicators - Latest topics
Next Post Previous Post
No Comment
Add Comment
comment url