Cybersecurity experts found a new type of cyber attack tool called "Deadglyph" used by a group known as Stealth Falcon. What's unusual about it is that it's made of two different parts, which isn't common. This makes it harder to understand and stop. Unlike other similar tools, it takes orders from a server controlled by the attackers. This allows it to do things like start new programs, read files, and gather information from the hacked computers.
Stealth Falcon, also known as FruityArmor, was first discovered in 2016. It was connected to targeted cyber attacks in the Middle East, targeting journalists and activists. They used tricky emails with harmful links to deliver a special program that can do many things on a computer.
Stealth Falcon has been linked to using secret hacking methods before. They've been connected to using special tools to take advantage of weaknesses in the Windows operating system. One of the tools they've used was named Win32/StealthFalcon, which let them control a computer completely.
Deadglyph is a new tool that Stealth Falcon is using. It was discovered when they attacked a Middle Eastern government. We don't know exactly how it's delivered yet, but we do know that it's really good at hiding itself and can even remove itself to stay hidden.
This tool can do many things, like creating new programs, accessing files, and collecting information about the computer it's on. It communicates with a server to get its instructions. It can even remove itself so that it's harder to find.
In simple terms, Deadglyph is a powerful cyber attack tool used by a group called Stealth Falcon. It's unique because it's made of two parts, which makes it harder to understand. This group has been active for a while and is known for targeting specific people in the Middle East. They use special emails to trick people into letting the attack in.
This group has used secret tricks to take advantage of weaknesses in the Windows system. Deadglyph is their latest tool and it's really good at hiding. It can do a lot of things on a computer, and it gets its instructions from a faraway server. It can even remove itself to stay hidden.
