Chinotto Backdoor: Technical Analysis of the APT Reaper’s Powerful Weapon

Download Report

In this report, we analyzed new techniques used by the Backdoor of the Reaper APT Group. Compare to old variants, it can now log your keystrokes, take screenshots and more.

Relevant Reports

We see the full picture of the evolving cyber threat landscape thanks to unique tools for monitoring the infrastructure used by cybercriminals and data from battlefields: