2022-02-01

APT36's Malware Arsenal

Level: 
Tactical
  |  Source: 
TrendMicro
Cybersecurity
Government
Healthcare
Information & Technology
Share:

APT36's Malware Arsenal

TrendMicro’s tracking of APT36/Earth Karkaddan shared research from January 2020 to September 2021, detailing the threat group's recent campaigns. Crimson RAT (Windows), ObliqueRat (Windows) and CapaRAT (Android), were the three malware observed from the group. The threat group utilizes spear-phishing emails or a USB for initial access. The phishing emails lure victims, leveraging themes involving the government, coronavirus and others. Following the execution of a malicious link, file, or document, the RAT drops and executes on the system. Activities following, vary with the RATs having numerous capabilities for system reconnaissance, data collection and exfiltration.

     

Get trending threats published weekly by the Anvilogic team.

Sign Up Now