New Zardoor Backdoor Used in Long-Term Cyber Espionage Operation Targeting an Islamic Organization
The threat actor maintained long-term access to the victim’s network, evading detection by using living-off-the-land binaries, side-loading backdoors, and leveraging open-source reverse proxy tools like Fast Reverse Proxy (FRP) and Venom.