The WildPressure was spotted for the first time in August 2019 when researchers detected a never-before-seen malware that has no similarities with other samples analyzed by the experts.
“In August 2019, Kaspersky discovered a malicious
The backdoor implements a broad range of features for remote device management of a compromised host.
Further investigation led
The analysis of the Milum code revealed that it doesn’t have similarities to malware involved in other operations attributed to known APT groups.
In September 2019, Kaspersky researchers were able to
To date, it is still unclear the way the Milum trojan was spread by the threat actor and it is still impossible to attribute the attack a specific state.
“Any similarities should be considered weak in terms of attribution, and may simply be techniques copied from previous well-known cases. Indeed, this “learning from more experienced attackers” cycle has been adopted by some interesting new actors in recent years.” concludes the report.
“We should also be cautious regarding the true targeting of this new set of activities, as it is probably too soon to jump to conclusions. The targeted nature seems to be clear, but the targeting itself might be limited by our own visibility. The malware is not exclusively designed against any kind of victim in particular and might be reused in other operations.”