Ad End 1 May 2026
Ad End 4 April 2026
banner Expire 3 July 2026
ad End 25 April 2026
banner Expire 25 April 2025
adv exp at 20 April 2026
banner Expire 25 April 2025
banner Expire 23 June 2026
ad End 17 June 2026
banner Expire 10 May 2026
What's new
Ads end 31 October 2026
ad End 5 May 2026
Money Club cc shop
Wizard's shop 2.0
Ad Ends 13 July 2025
Trump cc shop
UniCvv
RonalClub cc shop
BidenCash Shop
Blackstash cc shop
Kfc CLub
Yale Lodge
best shop

Dark_Code_x

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 28, 2020
Messages
6,865
Reaction score
741
Points
212
Awards
2
  • Somebody Likes you
  • First post
The malware code of the new grouping has nothing to do with any previously known APT campaign.





Kaspersky Lab experts have discovered a new, previously unknown cybercriminal grouping that is currently targeting industrial sites in the Middle East.

The group is called WildPressure. The main weapon of criminals is a new backdoor called Milum, written in C ++, which gives its operators complete control over the infected host.

Computer systems infected with Milum were first detected by researchers in August 2019, but later traces of infections were discovered until May 31, 2019. As the results of the code analysis showed, Milum was compiled two months earlier - in March 2019.

According to experts, Milum was composed of a relatively new code, without intersections or similarities with any other APT group. In particular, the malware is able to perform the following functions: download and execute the commands of its operator, collect various information from the target device and send it to the C&C server and update to a newer version.

Experts suggest that most of the goals of the new malware campaign are in the Middle East, as Iranian IP addresses were connected to Milum's C&C server.
 
Ad End 1 November 2024
Top