Boletines de Vulnerabilidades

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA)


Información sobre el sistema

   
Software afectado VMWare

Descripción

Dacls, aka MATA, is a cross-platform RAT used by the DPRK-linked Lazarus Group and the first artifacts were observed around April 2018. The VMware Threat Analysis Unit (TAU) first discovered the Dacls C2 servers on the Internet by protocol emulation in August 2020. TAU is providing details here on how to detect the C2 servers … ContinuedThe post Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA) appeared first on VMware Security Blog.

More info:

https://blogs.vmware.com/security/2022/11/threat-analysis-active-c2-discovery-using-protocol-emulation-part4-dacls-aka-mata.html?utm_source=rss&utm_medium=rss&utm_campaign=threat-analysis-active-c2-discovery-using-protocol-emulation-part4-dacls-aka-mata

Identificadores estándar

Propiedad Valor
CVE CVE-2022-3602 and CVE-2022-3786.

Histórico de versiones

Versión Comentario Data
1.0 Advisory issued 2022-11-22
Ministerio de Defensa
CNI
CCN
CCN-CERT