"'DuneQuixote' Shows Stealth Cyberattack Methods Are Evolving"

Classic and novel stealth techniques helped "DuneQuixote" remain hidden for at least a year. The threat actor behind the campaign spied on a Middle Eastern government organization. Before researchers reached the attack, at least 30 infections had been recorded against other organizations, mostly around the Middle East. Experts say cyberattackers have improved their stealth across the board. The DuneQuixote campaign has two malware droppers and two payloads. One of the droppers mimics the Total Commander, combining legitimate and malicious components. After entering a targeted machine, it performs anti-analysis checks, such as a search for security software. This article continues to discuss findings and observations regarding the DuneQuixote campaign. 

Dark Reading reports "'DuneQuixote' Shows Stealth Cyberattack Methods Are Evolving"

Submitted by grigby1

Submitted by grigby1 CPVI on