This week, ESET researchers published the results of their probe into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities, including those based in Europe. The toolsets were deployed by a little-known APT group called GoldenJackal and allowed it to penetrate and maintain persistence in targeted systems, gather, process and exfiltrate information of interest from them, as well as provide configurations and commands to other systems.
How exactly were the attacks executed, and what more is there to know about GoldenJackal's tactics, techniques, and procedures? Find out in the video and make sure to also read the aptly-named blogpost that has all the technical details: Mind the (air) gap: GoldenJackal gooses government guardrails.
Connect with us on Facebook, Twitter, LinkedIn and Instagram.