Hiatus Malware Resurfaces: Taiwan Firms and U.S. Military

by

in
Hiatus Malware Resurfaces: Taiwan Firms and U.S. Military

The threat actors behind the HiatusRAT malware have returned from their hiatus and are back at it again with a new wave of reconnaissance and targeting activity against Taiwan-based organizations and a U.S. military procurement system.

According to Trend Micro, the activity cluster is brazen and one of the most audacious, indicating that the threat actors do not intend to stop until they win.

No one knows yet who the attackers are or where they’re from.

Here’s a quick breakdown of the malware’s infrastructure: it’s built around a set of servers that can communicate with the victim networks.

These servers are attached to Tier 1 servers and are managed by Tier 2 servers.

It all makes sense, because everything has to do with money.

#shorts #techshorts #technews #tech #technology #threat actors #June #HiatusRAT malware

๐Ÿ‘‹ Feeling the vibes?

Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐Ÿ›๏ธ

If not, consider contributing to my caffeine supply at Buy Me a Coffee โ˜•๏ธ.

Your clicks = cosmic support for more awesome content! ๐Ÿš€๐ŸŒˆ


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *