[THIS IS A PRESS RELEASE]
Kaspersky’s Global Research and Analysis Team (GReAT) experts observed HoneyMyte APT enhanced the CoolClient backdoor with new features, deployed several variants of a browser login data stealer and used multiple scripts for data theft and reconnaissance. The APT’s latest campaigns targeted Myanmar, Mongolia, Malaysia, Thailand and Russia, with a particular focus on the government sector.
