In this blogpost, we will sum up the findings published in full in our white paper “Okrum and Ketrican: An overview of recent Ke3chang group activity”. The Ke3chang group, also known as APT15, is a ...
An elusive hacking operation is using a previously unreported backdoor in a malware campaign targeting diplomats and government departments around the world. The Ke3chang advanced persistent threat ...
The cyber-espionage activities of the Ke3chang advanced persistent threat (APT) group (also known as Vixen Panda, Royal APT, Playful Dragon, and APT15) span over almost a decade, going as far as 2010 ...
The cyberspy group’s activities are broader than originally thought. The Ke3chang cyberespionage group, a.k.a. APT15, Mirage, Playful Dragon or Vixen Panda, has been tied to a backdoor called Okrum ...
The Ke3chang hacking group historically believed to be operating out of China has developed new malware dubbed Ketrum by merging features and source code from their older Ketrican and Okrum backdoors.
Evidence suggests that new versions of malware families are linked to the elusive Ke3chang group, along with a previously unreported backdoor, according to researchers at ESET. The researchers have ...
ESET researchers have discovered new versions of malware families linked to the elusive Ke3chang group, along with a previously unreported backdoor. ESET has been tracking the APT group, which is ...
ESET researchers release new findings about malware linked to the elusive Ke3chang APT group, including details about a previously unreported backdoor that they named Okrum. There are still over ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results