all InfoSec news
DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation
Jan. 24, 2023, 11:01 a.m. | MalBot
Malware Analysis, News and Indicators - Latest topics malware.news
By Aleksandar Milenkoski, Joey Chen, and Amitai Ben Shushan Ehrlich
Executive Summary
- SentinelLabs tracks a cluster of recent opportunistic attacks against organizations in East Asia as DragonSpark.
- SentinelLabs assesses it is highly likely that a Chinese-speaking actor is behind the DragonSpark attacks.
- The attacks provide evidence that Chinese-speaking threat actors are adopting the little known open source tool SparkRAT.
- The threat actors use Golang malware that implements an uncommon technique for hindering static analysis and evading detection: Golang source code …
actor asia attacks ben chen chinese cluster code detection dragonspark evade executive golang golang source code interpretation malware malware analysis open source organizations sentinellabs source code sparkrat speaking threat threat actors tool
More from malware.news / Malware Analysis, News and Indicators - Latest topics
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Systems Security Officer (ISSO) (Remote within HR Virginia area)
@ OneZero Solutions | Portsmouth, VA, USA
Security Analyst
@ UNDP | Tripoli (LBY), Libya
Senior Incident Response Consultant
@ Google | United Kingdom
Product Manager II, Threat Intelligence, Google Cloud
@ Google | Austin, TX, USA; Reston, VA, USA
Cloud Security Analyst
@ Cloud Peritus | Bengaluru, India