The attackers behind the breach of the New York Times’ computer network late last year appear to be mounting fresh assaults that leverage new and improved versions of malware.
The new campaigns mark the first significant stirrings from the group since it went silent in January in the wake of a detailed expose of the group and its exploits – and a retooling of what security researchers believe is a massive spying operation based in China [1].
The newest campaign uses updated versions of Aumlib and Ixeshe.