Names | Gh0stCringe RAT | |
Category | Malware | |
Type | Backdoor | |
Description | (Palo Alto) Another piece of malware that the attackers tried to use is Gh0stCringe, which is based on the source code of Gh0st RAT. The attackers tried to execute this tool twice, with a gap of over 10 days between executions. | |
Information | <https://unit42.paloaltonetworks.com/alloy-taurus-targets-se-asian-government/> |
Last change to this tool card: 12 October 2023
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Gallium | 2018-Jun 2022 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |