Attackers compromised governmental, media and defense companies’ websites. They injected malicious JavaScript code in order to fingerprint the visitors and redirect them to a server that may deliver a browser exploit. In 2021, we noticed a shift to a strong focus on Yemen
. 2/4
-
-
Show this thread
-
Information about recent Candiru operations was disclosed last July by
@citizenlab,@MsftSecIntel and@Google TAG. https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/ … https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/ … https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/ … 3/4Show this thread -
Don’t miss our presentation at
@CYBERWARCON. We will present details of this discovery that go beyond the blogpost. As usual, plaintext IoCs are available on our GitHub account: https://github.com/eset/malware-ioc/tree/master/swc-candiru … 4/4Show this thread
End of conversation
New conversation -
-
-
Thanks for reporting! Next time please let us know so we can prevent it, things like this need to be told to the domain/hosting providers so we can take it down.
-
Thanks for your message, not all registrars are so cooperative and want to be part of the solution! See DM.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.