Cybersecurity sleuths at SentinelLabs have requested assistance from the broader threat hunting community to decipher a new malware campaign affecting telcos, ISPs, and universities across the Middle East and Africa.
The never-before-seen threat actor Metador employs sophisticated technical techniques to implant Windows-based malware implants and canning techniques to evade detection, but SentinelLabs researchers claim there is still no clear, reliable sense of attribution despite months of code inspection. SentinelLabs malware researchers Juan Andres Guerrero-Saade, Amitai Ben Shushan Ehrlich, and Aleksandar Milenkoski shared technical artifacts related to Metador at the recent LABScon security conference, launching a crowdsourced effort to better understand the adversary.
The research team claimed that attempts to link Metador to the threat actor encountered numerous obstacles and prevented thorough documentation.
Read More: Researchers Crowdsourcing Effort to Identify Mysterious Metador APT
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.