APT42’s Operations Employ “Nicecurl” and “Tamecat” Malwares

Threat Level – Red | Vulnerability Report
Download PDF

APT42 has been observed targeting entities in both the Middle East and Western regions, infiltrating their cloud environments and corporate networks using social engineering techniques, particularly by impersonating journalists. Using malicious emails as their primary vector, APT42 infects recipients with two distinct backdoors known as “Nicecurl” and “Tamecat.” Once deployed within the compromised systems, these backdoors provide the attackers with capabilities for data exfiltration and command execution.

Threat Level – Red | Attack Report

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox