This past year Unit 42 has seen a resurgence of keylogger activity and it seems like every week a new research blog comes out talking about one of four popular families: KeyBase, iSpy, HawkEye, or PredatorPain. These blogs usually delve into the technical workings of the threats, discuss their relationship to each other, and explain how they evolved from one another through new ownership or branding of the tools. The intent of this blog is not to rehash what has already been discussed, but instead to shift the focus to the actors behind these keylogger threats and show a practical technique for identification. Source : http://researchcenter.paloaltonetworks.com/2016/07/unit42-how-to-track-actors-behind-keyloggers-using-embedded-credentials/
Created: 2026-02-23
Indicatorsは見つかっていない。
このPulseに見つかったCVEはありません。