Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation PortReuse

The Winnti Group targeted an unnamed hardware and software company in Asia with the PortReuse malware. The backdoor sits passively on the network waiting on a magic packet from the actor to trigger malicious code. The components of the modular malware are separate processes that communicate using named pipes.
Name Modified Date Sources
Operation PortReuse 2019-10-16