{"id":109677,"date":"2023-05-23T08:00:02","date_gmt":"2023-05-23T08:00:02","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=109677"},"modified":"2023-05-22T14:30:14","modified_gmt":"2023-05-22T14:30:14","slug":"goldenjackal-apt-group","status":"publish","type":"post","link":"https:\/\/securelist.com\/goldenjackal-apt-group\/109677\/","title":{"rendered":"Meet the GoldenJackal APT group. Don’t expect any howls"},"content":{"rendered":"

GoldenJackal is an APT group, active since 2019, that usually targets government and diplomatic entities in the Middle East and South Asia. Despite the fact that they began their activities years ago, this group is generally unknown and, as far as we know, has not been publicly described.<\/p>\n

We started monitoring the group in mid-2020 and have observed a constant level of activity that indicates a capable and stealthy actor. The main feature of this group is a specific toolset of .NET malware, JackalControl, JackalWorm, JackalSteal, JackalPerInfo and JackalScreenWatcher intended to:<\/p>\n