May 6, 2024, 10:15 a.m. | Divya

GBHackers On Security gbhackers.com

The Damselfly Advanced Persistent Threat (APT) group, also known as APT42, has been actively utilizing custom backdoor variants, NiceCurl and TameCat, to infiltrate Windows machines. These backdoors are primarily delivered through spear-phishing campaigns, marking a significant escalation in the capabilities and focus of this Iranian state-sponsored hacking group. Document Integrate ANY.RUN in Your Company for […]


The post Hackers Use Custom Backdoor & Powershell Scripts to Attack Windows Machines appeared first on GBHackers on Security | #1 Globally Trusted Cyber …

advanced advanced persistent threat apt apt42 attack backdoor backdoors campaigns capabilities custom cyber-attack cyber security document escalation focus hackers hacking hacking group iranian machines persistent persistent threat phishing phishing campaigns powershell powershell scripts scripts sponsored state state-sponsored hacking threat windows

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal