Daily Tech News, Interviews, Reviews and Updates

GoMet Backdoor Used By Hackers To Target A Ukrainian Software Company

According to a fresh study, an “uncommon” piece of malware was used to attack a significant software development business whose software is utilized by many governmental bodies in Ukraine.

The virus, which was discovered for the first time on May 19, 2022, is a specialized version of the GoMet open-source backdoor and is intended to keep permanent access to the network.

According to Cisco Talos, this access might be used to launch subsequent attacks, get deeper access, or corrupt the software supply chain, among other things.

The cybersecurity company’s evaluation indicates Russian nation-state action even though there are no specific signs that the assault can be traced to a particular person or organization.

The discoveries coincide with the U.S. Cyber Command’s Wednesday release of indications of compromise (IoCs) concerning various malware strains that have recently targeted Ukrainian networks, including GrimPlant, GraphSteel, and Cobalt Strike Beacon, and MicroBackdoor.

Since then, the phishing assaults have been linked to two espionage actors named UNC1151 (also known as Ghostwriter) and UNC2589, the latter of which is said to “operate in support of Russian government interest and has been undertaking considerable espionage collection in Ukraine.”

 



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More