Key points:
- The group, previously thought dormant, has been active with updated malware for reconnaissance and data exfiltration.
- New malware versions Foudre v34 and Tonnerre v17 feature significant changes in delivery and command-and-control mechanisms.
- Malware is now delivered via Excel files with embedded executables, evading detection by antivirus software.
- The group has shifted to using Telegram for communication with select victims, indicating a change in operational tactics.
- Victims include individuals in Iran and several other countries, with ongoing monitoring proving challenging due to frequent C2 server changes.
Sources:
CSO Online
(1 articles)