Chinotto Backdoor: Technical Analysis of the APT Reaper’s Powerful Weapon
Download Report
In this report, we analyzed new techniques used by the Backdoor of the Reaper APT Group. Compare to old variants, it can now log your keystrokes, take screenshots and more.
Relevant Reports
We see the full picture of the evolving cyber threat landscape thanks to unique tools for monitoring the infrastructure used by cybercriminals and data from battlefields: