Sponsor Malware Attacking Government, and Healthcare Organizations

Iran-aligned APT group Ballistic Bobcat, also known as APT35, APT42, Charming Kitten, TA453, and PHOSPHORUS, has launched a new campaign, Sponsor Malware, targeting Brazil, Israel, and the UAE. The group exploited Microsoft Exchange vulnerabilities and used innocuous configuration files and a modular approach to evade scans. Targets included COVID-19-related organizations and an Israeli insurance marketplace.