A previously unknown and technically sophisticated advanced persistent threat (APT) framework that has been in operation for five years has been discovered. Revealed by Kaspersky Lab and dubbed Project TajMahal, the newly discovered APT framework contains up to 80 malicious modules stored in its encrypted virtual file system (VFS) including backdoors, loaders, orchestrators, C2 communicators, audio recorders, keyloggers, screen and webcam grabbers, documents and cryptography key stealers, and its own file indexer.
[ Learn how Cybercrime groups are raising the bar for security teams by borrowing APT techniques. | Sign up for CSO newsletters! ]
To read this article in full, please click here