all InfoSec news
LABScon Replay | Does This Look Infected 2 (APT41)
Malware Analysis, News and Indicators - Latest topics malware.news
In March of 2022, Mandiant released new research detailing APT41’s persistent campaign leveraging novel exploits, malware, and techniques to compromise U.S. State Government networks. APT41 continued to demonstrate their tempo by exploiting a zero-day in an animal health management application before quickly shifting to operationalize the then fresh Log4j vulnerability.
At the time, APT41’s goals were unclear. The “Double Dragon’s” name is derived from APT41’s well documented dual espionage and cybercrime operation. Were they hitting U.S. State Governments to support …
animal application apt41 campaign compromise exploiting exploits government health health management labscon log4j log4j vulnerability malware malware analysis management management application mandiant march networks novel persistent quickly replay research state state government techniques vulnerability zero-day