Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&C infrastructure to thwart forensic investigations, the APT group leveraged Trojanized popular tools, such as archivers, file recovery applications, remote connections applications, utilities, and even security software, to cover a wide range of options that targeted victims might be seeking.
Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene.
You can find the research here:
StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure
Learn more about your ad choices. Visit megaphone.fm/adchoices