“It comes to us as no surprise that this type of intelligence agency-grade malware would eventually fall into cybercriminals’ hands,” Sentinel Labs states. “Gyges is an early example of how advanced techniques and code developed by governments for espionage are effectively being repurposed, modularized and coupled with other malware to commit cybercrime.”
Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.
Read more about Cyber Security
- What is Next Generation Endpoint Protection?
- 7 Ways Hackers Steal Your Passwords
- EDR vs Antivirus: What’s the Difference?
- What Are TTPs? Tactics, Techniques & Procedures – Inside the Mind of a Cyber Attacker
- The Changing Role of the CISO in 2024 | Navigating New Frontiers in Cybersecurity
- Unseen Threats in Software Development | The Perils of Trojanized NPM Packages