"Chinese 'Stayin' Alive' Attacks Dance Onto Targets With Dumb Malware"

Chinese Advanced Persistent Threats (APTs) have been known to be sophisticated, but the ToddyCat group is defying this trend by compromising telecommunications organizations in Central and Southeast Asia with a constantly evolving arsenal of custom but basic backdoors and loaders. ToddyCat was discovered in 2022, but has been active since at least 2020. According to Check Point, it has been involved in Chinese espionage operations. Check Point's researchers say the group stays active by quickly deploying and discarding inexpensive malware used to deliver its payloads. Since at least 2021, telecommunications organizations from Kazakhstan, Pakistan, Uzbekistan, and Vietnam have fallen victim to its latest "Stayin' Alive" campaign. This article continues to discuss ToddyCat's Stayin' Alive campaign.

Dark Reading reports "Chinese 'Stayin' Alive' Attacks Dance Onto Targets With Dumb Malware"

Submitted by grigby1

Submitted by grigby1 CPVI on