<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New BugSleep malware implant deployed in MuddyWater attacks in Threats</title>
    <link>https://community.isc2.org/t5/Threats/New-BugSleep-malware-implant-deployed-in-MuddyWater-attacks/m-p/72103#M1255</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Iranian-backed MuddyWater hacking group has partially switched to using a new custom-tailored malware implant to steal files and run commands on compromised systems.&lt;/P&gt;&lt;P&gt;Dubbed BugSleep, this new backdoor is still actively being developed and was discovered by analysts at Check Point Research while being distributed via well-crafted phishing lures.&lt;/P&gt;&lt;P&gt;The campaign pushes the malware via phishing emails disguised as invitations to webinars or online courses. The emails redirect the targets to archives containing malicious payloads hosted on the Egnyte secure file-sharing platform.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/new-bugsleep-malware-implant-deployed-in-muddywater-attacks/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/new-bugsleep-malware-implant-deployed-in-muddywater-attacks/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jul 2024 21:16:14 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-07-17T21:16:14Z</dc:date>
    <item>
      <title>New BugSleep malware implant deployed in MuddyWater attacks</title>
      <link>https://community.isc2.org/t5/Threats/New-BugSleep-malware-implant-deployed-in-MuddyWater-attacks/m-p/72103#M1255</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Iranian-backed MuddyWater hacking group has partially switched to using a new custom-tailored malware implant to steal files and run commands on compromised systems.&lt;/P&gt;&lt;P&gt;Dubbed BugSleep, this new backdoor is still actively being developed and was discovered by analysts at Check Point Research while being distributed via well-crafted phishing lures.&lt;/P&gt;&lt;P&gt;The campaign pushes the malware via phishing emails disguised as invitations to webinars or online courses. The emails redirect the targets to archives containing malicious payloads hosted on the Egnyte secure file-sharing platform.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/new-bugsleep-malware-implant-deployed-in-muddywater-attacks/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/new-bugsleep-malware-implant-deployed-in-muddywater-attacks/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 21:16:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/New-BugSleep-malware-implant-deployed-in-MuddyWater-attacks/m-p/72103#M1255</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-17T21:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: New BugSleep malware implant deployed in MuddyWater attacks</title>
      <link>https://community.isc2.org/t5/Threats/New-BugSleep-malware-implant-deployed-in-MuddyWater-attacks/m-p/72185#M1265</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 08:35:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/New-BugSleep-malware-implant-deployed-in-MuddyWater-attacks/m-p/72185#M1265</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-19T08:35:44Z</dc:date>
    </item>
  </channel>
</rss>

