Also known as: Bitter, TA397, T-APT-17, Orange Yali, APT-C-08
The Bitter threat group initially started using RAT tools in their campaigns, as the first Bitter versions, for Android released in 2014 were based on the AndroRAT framework. Over time, they switched to a custom version that has been known as BitterRAT ever since.
No exploited CVEs have been attributed to this threat actor yet.
Browse CVE Database