{"id":1413,"date":"2020-05-16T03:18:15","date_gmt":"2020-05-16T03:18:15","guid":{"rendered":"https:\/\/www.infosystem.id\/?p=1413"},"modified":"2020-05-16T03:18:15","modified_gmt":"2020-05-16T03:18:15","slug":"russian-apt-turlas-compfun-malware-uses-http-status-codes-to-receive-commands","status":"publish","type":"post","link":"https:\/\/infosystem.id\/index.php\/2020\/05\/16\/russian-apt-turlas-compfun-malware-uses-http-status-codes-to-receive-commands\/","title":{"rendered":"Russian APT Turla\u2019s COMpfun malware uses HTTP status codes to receive commands"},"content":{"rendered":"<blockquote><p>Russia-linked cyberespionage group Turla targets diplomatic entities in Europe with a new piece of malware tracked as COMpfun. Security experts from Kaspersky Lab have uncovered a new cyberespionage campaign carried out by Russia-linked APT Turla that employs a new version of the COMpfun malware.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/securityaffairs.co\/wordpress\/103274\/apt\/turla-compfun-malware.html?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=turla-compfun-malware\">Russian APT Turla\u2019s COMpfun malware uses HTTP status codes to receive commands<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Russia-linked cyberespionage group Turla targets diplomatic entities in Europe with a new piece of malware tracked as COMpfun. Security experts from Kaspersky Lab have uncovered a new cyberespionage campaign carried out by Russia-linked APT Turla that employs a new version of the COMpfun malware. Source: Russian APT Turla\u2019s COMpfun malware uses HTTP status codes to&hellip;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,1],"tags":[30,29,28,18],"class_list":["post-1413","post","type-post","status-publish","format-standard","hentry","category-news","category-uncategorized","tag-kaspersky","tag-malware","tag-russian","tag-security"],"_links":{"self":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/comments?post=1413"}],"version-history":[{"count":1,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1413\/revisions"}],"predecessor-version":[{"id":1414,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1413\/revisions\/1414"}],"wp:attachment":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/media?parent=1413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/categories?post=1413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/tags?post=1413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}