Video
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine
06 Oct 2023
This week, ESET researchers released their findings about a cyberespionage campaign that took aim at a Guyanese governmental entity. Named Operation Jacana by ESET, the campaign deployed a previously undocumented backdoor, DinodasRAT, that can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine. Apart from DinodasRAT, the attackers also deployed a variant of Korplug (PlugX), leading the researchers to suspect that the campaign is the work of China-aligned operators.
Learn more about the attack in our technical blogpost here:
Operation Jacana: Foundling hobbits in Guyana
- SEO Powered Content & PR Distribution. Get Amplified Today.
- PlatoData.Network Vertical Generative Ai. Empower Yourself. Access Here.
- PlatoAiStream. Web3 Intelligence. Knowledge Amplified. Access Here.
- PlatoESG. Carbon, CleanTech, Energy, Environment, Solar, Waste Management. Access Here.
- PlatoHealth. Biotech and Clinical Trials Intelligence. Access Here.
- Source: https://www.welivesecurity.com/en/videos/dinodasrat-used-governmental-entity-guayana-week-security-tony-anscombe/
- :is
- 25
- a
- About
- actions
- against
- aim
- also
- and
- apart
- ARE
- At
- attack
- backdoor
- by
- Campaign
- CAN
- capable
- Category
- deployed
- editor
- entity
- execute
- Files
- findings
- from
- governmental
- here
- HTTPS
- in
- keys
- leading
- machine
- max-width
- more
- Named
- Oct
- of
- on
- operation
- operators
- our
- performing
- plato
- Plato Data Intelligence
- PlatoData
- previously
- registry
- released
- researchers
- security
- Technical
- that
- The
- their
- to
- Tony
- took
- us
- used
- Variant
- various
- week
- windows
- with
- Work
- zephyrnet