An elusive hacking operation is using a previously unreported backdoor in a malware campaign targeting diplomats and government departments around the world. The Ke3chang advanced persistent threat group is thought to operate out of China and has conducted cyber-espionage campaigns using remote access trojans and other malware since at least 2010. Now cybersecurity researchers at ESET have identified new attacks by Ke3chang – also known as APT 15 -which use an updated version of their Ketrican malware, alongside a new backdoor which has been dubbed Okrum.
Source: ZDNet