Oct. 19, 2023, 11:10 a.m. |

GovInfoSecurity.com RSS Syndication www.govinfosecurity.com

APT34 Used Microsoft Exchange Server to Send Email Commands to Backdoor Malware
Iranian state-sponsored hackers conducted an eight-month espionage campaign against a Middle Eastern government, compromising dozens of computers. The Crambus group exploited publicly available tools and three novel pieces of malware to access systems, maintain persistence and steal data.

access apt34 backdoor campaign computers data email espionage exchange exchange server exploited government hackers iran malware microsoft microsoft exchange microsoft exchange server middle east nation novel persistence send server sponsored state steal systems tools

Senior Security Engineer - Detection and Response

@ Fastly, Inc. | US (Remote)

Application Security Engineer

@ Solidigm | Zapopan, Mexico

Defensive Cyber Operations Engineer-Mid

@ ISYS Technologies | Aurora, CO, United States

Manager, Information Security GRC

@ OneTrust | Atlanta, Georgia

Senior Information Security Analyst | IAM

@ EBANX | Curitiba or São Paulo

Senior Information Security Engineer, Cloud Vulnerability Research

@ Google | New York City, USA; New York, USA