Winnti Group hits video gaming firms in Asia with PipeMon malware

clock • 2 min read

PipeMon is a modular backdoor that mimics print processing software

Researchers from cyber security firm ESET have discovered a new modular backdoor being used by infamous hacking group Winnti to target video game developers in Asia. In a new report published on...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Cybercriminals using Microsoft OneNote attachments to distribute Emotet malware

Threats and Risks

Move is aimed at circumventing macro-based security restrictions. Windows admins are advised to configure a group policy to mitigate the risk

clock 20 March 2023 • 3 min read

Threats and Risks

Attackers pile in after vulnerabilities revealed

clock 11 March 2021 • 2 min read

Threats and Risks

There's a growing trend for state-backed APT groups to carry out financially-motivated crimes, alongside their usual espionage operations

clock 01 December 2020 • 2 min read

More on Hacking

 Apple warns users of 'mercenary spyware'

Apple warns users of 'mercenary spyware'

Highly targeted message sent to users in 92 countries

Penny Horwood
clock 11 April 2024 • 1 min read
D-Link will not patch newly exploited NAS vulnerabilities

D-Link will not patch newly exploited NAS vulnerabilities

92,000 devices vulnerable

Penny Horwood
clock 09 April 2024 • 1 min read
Vet firm CVS suffers cyber breach

Vet firm CVS suffers cyber breach

Breach has accelerated cloud transformation

clock 09 April 2024 • 2 min read