“files and private keys. the android version of the backdoor was developed over the span of several months and eset says it found seven versions of it. eset researcher filip jurcacko said victims typically downloaded the compromised games through a web browser on their devices and…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
46%
“files and private keys. the android version of the backdoor was developed over the span of several months and eset says it found seven versions of it. eset researcher filip jurcacko said victims typically downloaded the compromised games through a web browser on their devices and…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.001Malware
35%
“north korean hackers targeted ethnic koreans in china with android ‘ birdcall ’ malware north korean hackers targeted ethnic koreans in china with android ‘ birdcall ’ malware ethnic koreans living in the yanbian region of china were targeted by a sophisticated north korean hacki…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.002Tool
33%
“north korean hackers targeted ethnic koreans in china with android ‘ birdcall ’ malware north korean hackers targeted ethnic koreans in china with android ‘ birdcall ’ malware ethnic koreans living in the yanbian region of china were targeted by a sophisticated north korean hacki…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Researchers at cybersecurity firm ESET attributed the campaign to APT37 and said the hackers used a backdoor attached to a suite of card games from a company called Sqgame.