Blind Eagle threat operation, also known as APT-C-36, that facilitate compromise with remote access trojans, including AsyncRAT, Remcos RAT, NjRAT, and BitRAT, reports The Hacker News. Blind Eagle’s intrusions commence with the distribution of government and financial organization-spoofing phishing emails with malicious attachments containing links that redirect to a website hosting a compressed ZIP archive as an initial dropper following geographical verification, according to a Kaspersky report.
Source: SC Magazine