Harvester APT's latest campaign deploys a Linux GoGra backdoor that hides its communications in Microsoft Outlook mailboxes using stolen credentials, making detection extremely difficult for targeted South Asian organizations.
A nation-state hacking group is using Microsoft Outlook and cloud APIs as secret channels for a new Linux GoGra backdoor, blending malicious activity with legitimate traffic and evading traditional security tools.
A new Linux backdoor deployed by the Harvester group is targeting South Asian entities, using Microsoft Graph API and Outlook mailboxes as covert command channels to evade detection and steal sensitive data.
APT41’s new Linux backdoor campaign is targeting major cloud platforms, using clever SMTP-based exfiltration and typosquatting to steal credentials while staying under the radar. Here’s how this evolving threat works—and what defenders need to know.
APT41’s latest Linux backdoor targets major cloud providers using innovative SMTP tactics, enabling undetectable credential theft and lateral movement across enterprise environments.
A stealthy Linux-based backdoor has been discovered in a major espionage campaign targeting telecom networks, highlighting the growing risks to critical communications infrastructure.
GhostPenguin, a sophisticated Linux backdoor, evaded detection for months by disguising itself as legitimate traffic. Discover how AI-driven threat hunting finally exposed its secrets—and why this marks a turning point in the fight against advanced malware.
GhostPenguin is a new Linux backdoor that evaded all antivirus detection until an AI system uncovered its presence. Its stealthy, resilient design signals a new era in cyber threats—and the need for advanced, AI-powered defenses.