The threat actors behind the HiatusRAT malware have returned from their hiatus and are back at it again with a new wave of reconnaissance and targeting activity against Taiwan-based organizations and a U.S. military procurement system.
According to Trend Micro, the activity cluster is brazen and one of the most audacious, indicating that the threat actors do not intend to stop until they win.
No one knows yet who the attackers are or where they’re from.
Here’s a quick breakdown of the malware’s infrastructure: it’s built around a set of servers that can communicate with the victim networks.
These servers are attached to Tier 1 servers and are managed by Tier 2 servers.
It all makes sense, because everything has to do with money.
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply