GRUzzly Bear :verified: · @1nternaut
239 followers · 107 posts · Server infosec.exchange

RT @sekoia_io@twitter.com

🕵️‍♂️ Following @Intrinsec@twitter.com’s report on 🇨🇳, we have just published a blogpost where we analyze TTPs and provide detection rules for most of them: blog.sekoia.io/lucky-mouse-inc

#apt27 #luckymouse #sigma #detectionengineering

Last updated 3 years ago

· @redfrog
2984 followers · 57952 posts · Server mamot.fr

discovered that /#APT27 used a code-signing certificate belonging to VMPsoft, the developer of the VMProtect packer.
The signed file is a loader for the SysUpdate backdoor (aka Soldier).
We notified VMPSoft of this compromise 1/4
virustotal.com/gui/file/a8527a

#luckymouse #ESETresearch

Last updated 3 years ago

GRUzzly Bear :verified: · @1nternaut
239 followers · 107 posts · Server infosec.exchange

RT @ESETresearch@twitter.com

discovered that /#APT27 used a code-signing certificate belonging to VMPsoft, the developer of the VMProtect packer. The signed file is a loader for the SysUpdate backdoor (aka Soldier). We notified VMPSoft of this compromise 1/4
virustotal.com/gui/file/a8527a

#ESETresearch #luckymouse

Last updated 3 years ago