NAPLISTENER: New Malware in REF2924 Group’s Arsenal for Bypassing Detection
,
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in South and Southeast Asia.
The malware, dubbed NAPLISTENER by Elastic Security Labs, is an HTTP listener programmed in C# and is designed to evade « network-based forms of detection. »
REF2924 is the moniker assigned to an activity cluster linked to attacks against an entity
The malware, dubbed NAPLISTENER by Elastic Security Labs, is an HTTP listener programmed in C# and is designed to evade « network-based forms of detection. »
REF2924 is the moniker assigned to an activity cluster linked to attacks against an entity
,
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in South and Southeast Asia.
The malware, dubbed NAPLISTENER by Elastic Security Labs, is an HTTP listener programmed in C# and is designed to evade « network-based forms of detection. »
REF2924 is the moniker assigned to an activity cluster linked to attacks against an entity
The malware, dubbed NAPLISTENER by Elastic Security Labs, is an HTTP listener programmed in C# and is designed to evade « network-based forms of detection. »
REF2924 is the moniker assigned to an activity cluster linked to attacks against an entity
, ,
https://thehackernews.com/2023/03/new-naplistener-malware-used-by-ref2924.html