New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East,
An unknown threat actor has been observed leveraging a malicious Windows kernel driver in attacks likely targeting the Middle East since at least May 2020.
Fortinet Fortiguard Labs, which dubbed the artifact WINTAPIX (WinTapix.sys), attributed the malware with low confidence to an Iranian threat actor.
« WinTapix.sys is essentially a loader, » security researchers Geri Revay and Hossein Jazi said
Fortinet Fortiguard Labs, which dubbed the artifact WINTAPIX (WinTapix.sys), attributed the malware with low confidence to an Iranian threat actor.
« WinTapix.sys is essentially a loader, » security researchers Geri Revay and Hossein Jazi said
,
An unknown threat actor has been observed leveraging a malicious Windows kernel driver in attacks likely targeting the Middle East since at least May 2020.
Fortinet Fortiguard Labs, which dubbed the artifact WINTAPIX (WinTapix.sys), attributed the malware with low confidence to an Iranian threat actor.
« WinTapix.sys is essentially a loader, » security researchers Geri Revay and Hossein Jazi said
Fortinet Fortiguard Labs, which dubbed the artifact WINTAPIX (WinTapix.sys), attributed the malware with low confidence to an Iranian threat actor.
« WinTapix.sys is essentially a loader, » security researchers Geri Revay and Hossein Jazi said
, ,
https://thehackernews.com/2023/05/new-wintapixsys-malware-engages-in.html