# Chinotto Backdoor Technical Analysis of the APT Reaper’s Powerful Weapon **[threatmon.io/chinotto-backdoor-technical-analysis-of-the-apt-reapers-powerful/](https://threatmon.io/chinotto-backdoor-technical-analysis-of-the-apt-reapers-powerful/)** ThreatMon March 28, 2023 Skip to content In this report, we analyzed new techniques used by the Backdoor of the Reaper APT Group. Compare to old variants, it can now log your keystrokes, take screenshots and more [Chinotto_Backdoor_Technical_Analysis_of_the_APT_Reaper’s_Powerful](https://threatmon.io/wp-content/uploads/2023/03/Chinotto_Backdoor_Technical_Analysis_of_the_APT_Reapers_Powerful.pdf) Tags [APT Group](https://threatmon.io/tag/apt-group/) [apt37](https://threatmon.io/tag/apt37/) [backdoor](https://threatmon.io/tag/backdoor/) [Chinotto](https://threatmon.io/tag/chinotto/) [cyber security](https://threatmon.io/tag/cyber-security/) [cyber threat intelligence](https://threatmon.io/tag/cyber-threat-intelligence/) [malware](https://threatmon.io/tag/malware/) [threat intelligenceCategories Report](https://threatmon.io/tag/threat-intelligence/) ## Leave a Comment © All Copyright 2022 by ThreatMon -----