Bitter APT Focuses on Turkish Defense Industry with WmRAT and MiyaRAT Malicious Software

During November 2024, a presumed South Asian cyber espionage group called Bitter aimed at an entity within the Turkish defense sector by deploying two C++-based malicious software variants identified as WmRAT and MiyaRAT.

During November 2024, a presumed South Asian cyber espionage group called Bitter aimed at an entity within the Turkish defense sector by deploying two C++-based malicious software variants identified as WmRAT and MiyaRAT.
Proofpoint stated, “The assault strategy involved employing alternate data streams within a RAR archive to distribute a shortcut (LNK) file which, in turn, generated a scheduled task on the targeted system to retrieve additional malicious payloads.”

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.