News

Dark Pink attacks continue to rely on ISO archives sent via spear-phishing for initial infection, which employs DLL side-loading to launch its signature backdoors, 'TelePowerBot' and 'KamiKakaBot.' ...
Dark Pink has been found to be targeting military bodies, government ministries and agencies, and religious and nonprofit organizations in Cambodia, Indonesia, Malaysia, Philippines, Vietnam and ...
The threat actor known as Dark Pink has been associated with deployments of the KamiKakaBot malware against multiple government entities in ASEAN (Association of Southeast Asian Nations) countries.
Dark Pink is the name given by Group-IB to the group believed to be behind the KamiKakaBot attacks that have struck the APAC region. APT attacks are often state-sponsored espionage campaigns and ...
The perpetrators, dubbed Dark Pink by the Singapore-based company, infiltrated five new targets using sophisticated malware and phishing emails.
Dubai — Group-IB, a global cybersecurity leader headquartered in Singapore, has today published a new update into the APT (advanced persistent threat) group codenamed Dark Pink, revealing that a total ...
A new advanced persistent threat (APT) group dubbed 'Dark Pink' by Group-IB (and 'Saaiwc Group' by Chinese cybersecurity researchers) has been spotted targeting various entities across Asia-Pacific ...