Diamond Member ThaHaka 0 Posted June 13 Diamond Member Share Posted June 13 This is the hidden content, please Sign In or Sign Up Threat actors with ties to Pakistan have been linked to a long-running malware campaign dubbed Operation Celestial Force since at least 2018. The activity, still ongoing, entails the use of an Android malware called GravityRAT and a Windows-based malware loader codenamed HeavyLift, according to Cisco Talos, which are administered using another standalone tool referred to as GravityAdmin. The This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/45924-h4ckn3wspakistan-linked-malware-campaign-evolves-to-target-windows-android-and-macos/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now