Evilnum APT group applied more sophistication in his operation

Today ESET published a report about the APT group Evilnum (active since at-least 2018) and its toolset . in the report ESET join the multiple links to track the activity of this group.
"In this article we connect the dots and disclose a detailed picture of Evilnum’s activities. The group’s targets remain fintech companies, but its toolset and infrastructure have evolved and now consist of a mix of custom, homemade malware combined with tools purchased from Golden Chickens, a Malware-as-a-Service (MaaS) provider whose infamous customers include FIN6 and Cobalt Group.
According to ESET’s telemetry, the targets are financial technology companies – for example, companies that offer platforms and tools for online trading. Although most of the targets are located in EU countries and the UK, we have also seen attacks in countries such as Australia and Canada. Typically, the targeted companies have offices in several locations, which probably explains the geographical diversity of the attacks." ESET wrote in his report.



No comments:

Infostealer Malware Masquerades as DeepSeek AI Tools on PyPI

  DeepSeek AI Tools Impersonated by Infostealer Malware on PyPI Cybercriminals are exploiting the growing popularity of DeepSeek AI by distr...