APT Gang Distributed Android Trojan via Syrian e-Government Platform

This article has been indexed from Softpedia News / Security

A cybercriminal gang associated with an advanced persistent threat (APT) has been found in connection with a new campaign that is distributing Android malware through the Syrian e-Government Web Portal, showing that the attacker has expanded his arsenal of tools for penetrating targets, according to The Hacker News. 

It is suspected that StrongPity, also referred to as Promethium by Microsoft, is allegedly active since 2012, typically focusing on targets in Syria and Turkey. In the mid-2020s, the threat actor was linked to a wave of operations that relied on watering-loop attacks and manipulated installers to infect targets with malware and abuse the popularity of genuine programs. 

The last process is no different, as benign software was repackaged into Trojanized variant…

Read the original article: APT Gang Distributed Android Trojan via Syrian e-Government Platform