China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration
Briefly

The group constantly updates its backdoor to evade detection and diversifies its methods to aid massive data exfiltration, demonstrating adaptability and resilience.
CeranaKeeper abuses popular, legitimate cloud and file-sharing services such as Dropbox and OneDrive to implement custom backdoors and extraction tools, indicating a sophisticated operational strategy.
Their extensive use of wildcard expressions for traversing entire drives highlights their objective of massive data siphoning across compromised networks, underscoring the scale of their operations.
ESET characterized CeranaKeeper as aggressive and greedy for its ability to move laterally within systems, showing a relentless pursuit of information through various backdoors.
Read at The Hacker News
[
|
]