This report provides an in-depth technical analysis of the backdoor and its capabilities, and analyzes the connection between Kapeka and Sandworm group. The purpose of this report is to raise awareness amongst businesses, governments, and the broader security community. WithSecure has engaged governments and select customers with advanced copies of this report. In addition to the report, we are releasing several artifacts developed as a result of our research, including a registry-based & hardcoded configuration extractor, a script to decrypt and emulate the backdoor’s network communication, and as might be expected, a list of indicators of compromise, YARA rules, and MITRE ATT&CK mapping
⚡ BREAKING⚡ State-sponsored hackers have been secretly infecting systems in Western countries with #Kapeka malware. 🕵️
But now, cybersecurity experts are on their trail!
Here's everything you need to know about the latest Russian cyberattack: 👉 https://tuta.com/blog/kapeka-malware-russia
I haven't seen a lot of posts regarding the newly "discovered" Russian backdoor #Kapeka from any of the usual suspects. Only articles in general newspapers.
Is this just hyped by a security firm?