The SpyRATs of OceanLotus
By Cylance
Added
This paper takes a look at several bespoke backdoors deployed by OceanLotus Group, as well as evidence of the threat actor using obfuscated CobaltStrik Beacon payloads to perform C2.
Tags
C2 Backdoor Malware Boundary defense Threat actor Endpoint Integrity Spoofing Credentials Social mediaTopic Map
