ESET cyber security experts: The malware is a dynamic-link library that is installed and loaded by two earlier-stage components, and it’s periodically implemented to avoid detection.
Cybaze-Yoroi ZLAB cyber security experts: The campaign shows the Matryoshka structure to chain SFX archives, typical of APT implant, and the use of a legit third party RAT as payload.
Last chapter of the story of the two groups, which share roots and purpose of recreating the Caliphate. Bin Laden’s network (mastermind) and Daesh (armed wing) point to Khorasan-Kashmir.
Cisco Talos cyber security experts: It features several changes and improvements to control where the malware can spread and avoid analysis by sandboxes and antivirus.
Chapter 7 of a study on the history of the two groups, to understand why they share same roots and purposes, aimed at recreating the Caliphate. Shiites and Sunnis, Iran and Daesh’s operational strategy.
Proofpoint cyber security experts: The group use malware variants that exploit third-party payloads such as Qbot, The Trick, IcedID, and Gootkit. Emotet use will grow.
A massive counterattack is underway to tighten the circle on the General's troops south of Tripoli. Meanwhile, Sarraj flies to Italy to ask for post-civil war support.
In an ongoing operation against cybercrime, international agencies made 61 arrests and shut down 50 accounts. Also seized drugs, firearms, and over €6,2 million.
Iraqi intelligence dismantles the largest financing cell of the Islamic State in the history of the country, with ramifications in Europe. Daesh has no more resources.
Jazeera Storm: If they escape or be freed it would be a catastrophe. The EU doesn’t take a position for now, but it risks the reorganization of the Islamic State in Iraq.