OceanLotus APT Group Uses Undetected Ratsnif Remote Trojan to Leverage Network Attack’s

0 minutes

Ratsnif

OceanLotus APT Group also known as APT32, SeaLotus, and CobaltKitty uses undetected Remote Access trojans Ratsnif to leverage network attack capabilities. The trojan was active since 2016, and it has features like packet sniffing, gateway/device ARP poisoning, DNS poisoning, HTTP injection, and MAC spoofing. The Cylance Threat Research Team detected four distinct samples of Ratsnif […]

Advertisements

The post OceanLotus APT Group Uses Undetected Ratsnif Remote Trojan to Leverage Network Attack’s appeared first on GBHackers On Security.



Source: GB Hackers – OceanLotus APT Group Uses Undetected Ratsnif Remote Trojan to Leverage Network Attack’s

Advertisements
Keep Ransomware Out with Heimdal PRO!