May 18, 2023, 1:31 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

In March of 2022, Mandiant released new research detailing APT41’s persistent campaign leveraging novel exploits, malware, and techniques to compromise U.S. State Government networks. APT41 continued to demonstrate their tempo by exploiting a zero-day in an animal health management application before quickly shifting to operationalize the then fresh Log4j vulnerability.


At the time, APT41’s goals were unclear. The “Double Dragon’s” name is derived from APT41’s well documented dual espionage and cybercrime operation. Were they hitting U.S. State Governments to support …

animal application apt41 campaign compromise exploiting exploits government health health management labscon log4j log4j vulnerability malware malware analysis management management application mandiant march networks novel persistent quickly replay research state state government techniques vulnerability zero-day

Information Security Engineers

@ D. E. Shaw Research | New York City

Cyber Security Professional

@ BT Group | 25A DLF City Phase-III,, Gurugram, India

Head of Cyber Security Operations

@ Vector Limited | Auckland, New Zealand

Security Analyst (SOC)

@ Accesa & RaRo | Cluj-Napoca, Romania

Senior - IT Compliance-Cyber (Technology Risk Consulting)

@ EY | Bengaluru, KA, IN, 560016

Security Automation Engineer Internship - Secure Development Team Product Security (Brno, Czech Republic)

@ Red Hat | Brno, Czechia