A new threat actor, Sticky Werewolf, has been linked to targeted attacks in Russia and Belarus using the Lumma Stealer malware. Kaspersky is tracking the activity under the name Angry Likho, which bears a resemblance to other known threat actors. The use of an undocumented implant suggests high-level sophistication, while the targeting of specific countries may indicate geopolitical motivations or local ties. As cybersecurity companies continue to monitor the situation, it's essential to understand the full extent of the threat and develop effective countermeasures to mitigate the spread of this malware.
Key Points
r 1. The use of unconventional names for malicious actors, such as Sticky Werewolf and Angry Likho, can make it challenging for cybersecurity companies to track and mitigate threats.r 2. The fact that the malware, Lumma Stealer, is delivered via a previously undocumented implant raises concerns about the sophistication and adaptability of modern threat actors.r 3. The targeting of countries like Russia and Belarus suggests potential geopolitical motivations or links to local cybercrime scenes.
Advertisement
Original Article
The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant.
Cybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a "strong resemblance" to Awaken Likho (aka Core Werewolf, GamaCopy, and
Comments