
image credit: adobe stock
Hackers aligned with the Iranian state are targeting vulnerable Microsoft Exchange Servers to deploy a new malware backdoor that has already victimized over two dozen Israeli organizations as part of an ongoing espionage campaign.
The campaign has been active since 2021 and uses a previously unseen malware backdoor that researchers at Eset dubbed Sponsor. The cybersecurity firm tracks the hacking group as “Ballistic Bobcat.” It is also known as Charming Kitten, APT35 and Mint Sandstorm – formerly known as Phosphorus. The group has spied on journalists, defense contractors and diplomats.