URL has been copied successfully!
Bitter Malware Employs Custom-Built Tools to Evade Detection in Advanced Attacks
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Bitter Malware Employs Custom-Built Tools to Evade Detection in Advanced Attacks

In a recent research by Proofpoint and Threatray has unveiled the intricate and evolving malware arsenal of the Bitter group, also known as TA397, believed to be a state-backed actor aligned with the interests of the Indian government. Active since 2016, Bitter has transformed its operations from deploying rudimentary downloaders to orchestrating sophisticated Remote Access […] The post Bitter Malware Employs Custom-Built Tools to Evade Detection in Advanced Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

First seen on gbhackers.com

Jump to article: gbhackers.com/bitter-malware-employs-custom-built-tools/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link