FakeWallet crypto stealer spreading through iOS apps in the App Store
ReportsKaspersky researchers 2026-4-20 09:31:14 Author: securelist.com(查看原文) 阅读量:10 收藏

Reports

Kaspersky researchers analyze updated CoolClient backdoor and new tools and scripts used in HoneyMyte (aka Mustang Panda or Bronze President) APT campaigns, including three variants of a browser data stealer.

Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor.

Kaspersky GReAT experts analyze the Evasive Panda APT’s infection chain, including shellcode encrypted with DPAPI and RC5, as well as the MgBot implant.

Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, PowerShower, and CloudAtlas.


文章来源: https://securelist.com/fakewallet-cryptostealer-ios-app-store/119482/
如有侵权请联系:admin#unsafe.sh