“It comes to us as no surprise that this type of intelligence agency-grade malware would eventually fall into cybercriminals’ hands,” Sentinel Labs states. “Gyges is an early example of how advanced techniques and code developed by governments for espionage are effectively being repurposed, modularized and coupled with other malware to commit cybercrime.”
Read more about Cyber Security
- What is Next Generation Endpoint Protection?
- Understanding the Difference Between EDR, SIEM, SOAR, and XDR
- What Is A Malware File Signature (And How Does It Work)?
- Why Your Operating System Isn’t Your Cybersecurity Friend
- SentinelOne’s Cybersecurity Predictions 2022: What’s Next?
- Our Take: SentinelOne’s 2022 MITRE ATT&CK Evaluation Results