Ad End 1 August 2025
Ad Ends 13 July 2025
ad End 25 October 2025
Ad Ends 20 April 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

Dark_Code_x

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 28, 2020
Messages
6,777
Reaction score
726
Points
212
Awards
2
  • Somebody Likes you
  • First post
The malware code of the new grouping has nothing to do with any previously known APT campaign.





Kaspersky Lab experts have discovered a new, previously unknown cybercriminal grouping that is currently targeting industrial sites in the Middle East.

The group is called WildPressure. The main weapon of criminals is a new backdoor called Milum, written in C ++, which gives its operators complete control over the infected host.

Computer systems infected with Milum were first detected by researchers in August 2019, but later traces of infections were discovered until May 31, 2019. As the results of the code analysis showed, Milum was compiled two months earlier - in March 2019.

According to experts, Milum was composed of a relatively new code, without intersections or similarities with any other APT group. In particular, the malware is able to perform the following functions: download and execute the commands of its operator, collect various information from the target device and send it to the C&C server and update to a newer version.

Experts suggest that most of the goals of the new malware campaign are in the Middle East, as Iranian IP addresses were connected to Milum's C&C server.
 
Ad End 1 February 2024
Top