State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments,
Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon.
The activity is being tracked by Palo Alto Networks Unit 42 under the moniker CL-STA-1020, where « CL » stands for « cluster » and « STA » refers to « state-backed motivation. »
« The threat actors behind this
The activity is being tracked by Palo Alto Networks Unit 42 under the moniker CL-STA-1020, where « CL » stands for « cluster » and « STA » refers to « state-backed motivation. »
« The threat actors behind this
,
Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon.
The activity is being tracked by Palo Alto Networks Unit 42 under the moniker CL-STA-1020, where « CL » stands for « cluster » and « STA » refers to « state-backed motivation. »
« The threat actors behind this
The activity is being tracked by Palo Alto Networks Unit 42 under the moniker CL-STA-1020, where « CL » stands for « cluster » and « STA » refers to « state-backed motivation. »
« The threat actors behind this
, ,
https://thehackernews.com/2025/07/state-backed-hazybeacon-malware-uses.html