China-linked MirrorFace APT targets Japan with ANEL backdoor
The group has changed its TTPs, returning to the ANEL backdoor, previously believed to have been abandoned after 2018.
The group has changed its TTPs, returning to the ANEL backdoor, previously believed to have been abandoned after 2018.
The attack is dead simple to execute and requires no authentication, the researchers note.
The BRUTED framework employs a multi-step attack process to identify and compromise edge network devices.
Malicious packages targeted cloud client functionalities for major services, including Alibaba Cloud, AWS, and Tencent Cloud.
The attack, which occurred sometime before March 14, 2025, involved a threat actor modifying the code of the tj-actions/changed-files GitHub Action.
In brief: Microsoft, Apple fix zero-days, LockBit ransomware dev extradited to the US, and more.
KoSpy is distributed through fake utility applications, which masquerade as helpful tools.
The breach is believed to be part of a broader cyberespionage effort by China’s government targeting US critical infrastructure.
The group first gained access to a target network through a terminal server used for managing devices.
The vulnerability could be exploited by attackers to break out of WebKit's Web Content sandbox by using maliciously crafted web content.
Showing elements 731 - 740