Iranian state-backed threat operation MuddyWater, also known as TA450, Mango Sandstorm, and Boggy Sandstorm, leveraged the novel DarkBeatC2 command-and-control infrastructure tool as part of its latest attack campaign, The Hacker News reports. Intrusions involved the usage of a compromised email account belonging to Israeli educational institution Kinneratacil to deliver spearphishing emails that contained Egnyte-hosted attachments that deploy the Atera Agent software, according to a report from Deep Instinct.
Source: SC Magazine