In a recent report, cybersecurity experts at Kaspersky Lab revealed that the Toddycat hacker group has been utilizing a diverse set of tools to infiltrate compromised systems and pilfer valuable data. Operating actively since December 2020, the group focuses on launching attacks primarily targeting government and defense entities within the Asia-Pacific region.
At the core of their hacking operations lies the use of passive backdoors. These backdoors can be inserted into software either during the development phase or after deployment, often through the introduction of malicious code. Once implemented, these backdoors serve dual purposes – enabling espionage activities as well as facilitating remote control of the system or device.