macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users,
Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a backdoor named HZ RAT.
The artifacts « almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers’ server, » Kaspersky researcher Sergey Puzan said.
HZ RAT was first
The artifacts « almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers’ server, » Kaspersky researcher Sergey Puzan said.
HZ RAT was first
,
Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a backdoor named HZ RAT.
The artifacts « almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers’ server, » Kaspersky researcher Sergey Puzan said.
HZ RAT was first
The artifacts « almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers’ server, » Kaspersky researcher Sergey Puzan said.
HZ RAT was first
, ,
https://thehackernews.com/2024/08/macos-version-of-hz-rat-backdoor.html