ESET researchers participate in the AP3 group Ke3chang
Okra finds the back door and shows that the group is still working
Update your code.
Scientists discover new versions of malware
Ke3chang belongs to the group and believes that the group works outside the association.
China. Minute Time, Catricon, Okram and Royal DNS all have backdoors
Cooperation with a threat group.
The Okram tail was first discovered in December 2016.
Special projects in Slovakia, Belgium, Chile, Guatemala and Portugal
According to a blog posted on July 18, all of Brazil in 2017
Our review of communication with Ke3chang was revealed
Recently discovered Okram malware and external backups allow us to meet high standards
Okram K3 Chang may be a group of scientists
Not me. I wrote about the activities of Ke3chang Group from 2015 to 2019, I see
It turns out that the team wins and fights for growth
Code over time.
According to scientists, Ocram is connected to a used catheter door
Katherine Beckman was installed in the fall of 2017. Ocrampacter
The dynamic library is installed and loaded in the last two steps
Parachute elements are hidden in PNG files.
In addition, Akram can do the same as K3 Chang
It contains malware and basic commands.
Violations include entering the shell command manually and exiting external commands
Tools for the most dangerous activities
All three focus on the same organizations in the back
Affected topics in Okram are also referred to as one or more topics
RoyalDNS Series / Tailgate.