Bitter APT Focuses on Turkish Defense Industry with WmRAT and MiyaRAT Malicious Software
During November 2024, a presumed South Asian cyber espionage group called Bitter aimed at an entity within the Turkish defense sector by deploying two C++-based malicious software variants identified as WmRAT and MiyaRAT.
Proofpoint stated, “The assault strategy involved employing alternate data streams within a RAR archive to distribute a shortcut (LNK) file which, in turn, generated a scheduled task on the targeted system to retrieve additional malicious payloads.”
Proofpoint stated, “The assault strategy involved employing alternate data streams within a RAR archive to distribute a shortcut (LNK) file which, in turn, generated a scheduled task on the targeted system to retrieve additional malicious payloads.”
