Research conducted by Kaspersky has revealed that the hacker group linked to cyber attacks in the Russo-Ukrainian conflict area, Bad Magic (also known as Red Stinger), may have been active for much longer than initially thought. The scope of the attacks has widened to include individuals, diplomatic entities, and research organizations in Western and Central Ukraine. The group is known to use a novel modular framework codenamed CloudWizard, which has capabilities to take screenshots, record microphone audio, log keystrokes, grab passwords, and harvest Gmail inboxes. Malwarebytes has identified five waves of espionage attacks mounted by the group dating back to December 2020. Further investigation has connected CloudWizard to older malware such as Prikormka and BugDrop, which have been used to target anti-government separatists in Donetsk and Luhansk, as well as Ukrainian government officials, politicians, and journalists since at least 2008. It is believed that the threat actor behind these operations has been continuously enhancing their toolset and targeting organizations of interest for over 15 years.
Source: Hackernews
To mitigate these potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.