![]() ![]() The results made it possible to rate the functionality and applicability of world’s leading spy-products that employ keylogging techniques.īut the time goes by, and we endeavor keeping abreast of it. Once we were among the first who carried out an independent comparison of the most popular monitoring software. New Initiative Express your point of view! The authors, Cedric Pernet and Kenney Lu, believe that this attack group, particularly Wool3n.H4t, are traditional or old-fashioned cyber criminals whose interests are inline with the Islamic Republic of Iran. Operation Woolen-GoldFish has managed to successfully infiltrate several companies and organizations in Israel and Europe. The researchers found in files collected from Rocket Kitten that they targeted entities in the defense industry, IT sector and different academic and government entities. Masoud is the one of the top 50 commonly used first names in Iran, the report added.īeacause of the nick name, Wool3nh4t, and the use of GHOLE malware phishing, the attack was named "Operation Woolen-GoldFish." The blog only contained two posts signed by Masoud_pk, which could be part of the real identity of Wool3nh4t. The nickname Wool3nh4t was found to own an inactive blog hosted by a free service in Iran and was registered in several underground hacking forums. ![]() Those who are more meticulous alter this information to lead investigators to false tracks," the report states.īut this attacker was not that sophisticated. ![]() "Cybercriminals quite often forget about metadata, which is generated by the software they use to produce or modify the files. "Once executed, the file drops a nonmalicious PowerPoint file used as a decoy file, while silently infecting the system with a variant of the CWoolger keylogger," the report explains. In one instance, a spear-phishing email was sent to an Israeli target, which directed to a Microsoft OneDrive link. The Ghole malware being a modified version of CORE IMPACT, a sophisticated penetration-testing tool from CORE - a company that develops legal software.Īs with the previous attack, user participation was needed to execute macros in a file. Rocket Kitten, the cyberattack group that recently launched an email malware campaign against European and Israeli targets, has delivered a new state-sponsored attack, according the a report by Trend Micro.Īs DFI News previously reported, Gadi Evronand and Tillman Werner explained at the 31th Chaos Communication Congress that email attachments delivered macros with the GHOLE malware. Rocket Kitten GHOLE Attack Returns With Keyloggers You are welcome to see the test results in the comparative table here. Real-time Remote Viewing – if you wish, you can view what is being done on your PC in real-time modeĪccess from Android and iOS – Using a special mobile app for Android or iOS, you can monitor your computer with no need to have physical access to itĪs a result, some of the products have changed their position in the table. Webcam Capture Recording – the software captures and stores images from your computer's webcam, which allows you to see at any time what is happening around your computer voice chat conversations, capturing them from your computer's microphone Microphone Audio Recording – the program records all sounds emitted near your computer, e.g. We have added new categories for monitoring products testing, since these functions are becoming more and more common in modern software: We have added new categories for monitoring products testing: Microphone and Webcam Recording etc. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |