A recently discovered Trojan malware campaign has targeted businesses and higher education systems in a possible attempt to steal private information, usernames, and passwords. They also tried to create a persistent backdoor in the manipulated systems. The cybersecurity organization Morphisec has detailed the Jupyter infostealer. The Trojan is supposed to be active since May 2019.
Read More: How Disinformation Affects CISOs
Jupyter Trojan mainly targeted Firefox, Chrome, and Chromium browser data; the backdoor creation capability allows hackers to deploy PowerShell commands and scripts. It also can download and execute extra malware. The Trojan is disguised as a zipped folder and often uses Microsoft file names and icons that appear to contain important details.
Source: zdnet