Two previously undocumented pieces of malware, a downloader and a backdoor, were used in a watering hole operation attributed to the Russian-based threat group Turla. The new tools are a.NET malware dropper called NetFlash and a Python-based backdoor named PyFlash. They would be delivered following a fake Adobe Flash update notification received by victims. At least four Armenian websites were infected by yet unknown means in this campaign, which started since at least the beginning of 2019. This indicates that the threat actor was after government officials and politicians.
Source: https://www.bleepingcomputer.com/news/security/advanced-russian-hackers-use-new-malware-in-watering-hole-operation/

