FireEye has identified APT35 operations dating back to 2014. APT35, also known as the Newscaster Team, is a threat group sponsored by the Iranian government that conducts long term, resource-intensive operations to collect strategic intelligence. APT35 typically targets U.S. and the Middle Eastern military, diplomatic and government personnel, organizations in the media, energy and defense industrial base (DIB), and engineering, business services and telecommunications sectors.
2023-04-18 ⋅ Microsoft ⋅ Microsoft Threat Intelligence @online{intelligence:20230418:nationstate:11efa4c,
author = {Microsoft Threat Intelligence},
title = {{Nation-state threat actor PHOSPHORUS refines tradecraft to attack high-value targets}},
date = {2023-04-18},
organization = {Microsoft},
url = {https://www.microsoft.com/en-us/security/blog/2023/04/18/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets/},
language = {English},
urldate = {2023-04-22}
}
Nation-state threat actor PHOSPHORUS refines tradecraft to attack high-value targets Drokbk |
2023-01-04 ⋅ K7 Security ⋅ Saikumaravel @online{saikumaravel:20230104:pupy:f6eacce,
author = {Saikumaravel},
title = {{Pupy RAT hiding under WerFault’s cover}},
date = {2023-01-04},
organization = {K7 Security},
url = {https://labs.k7computing.com/index.php/pupy-rat-hiding-under-werfaults-cover/},
language = {English},
urldate = {2023-01-05}
}
Pupy RAT hiding under WerFault’s cover pupy |
2022-12-09 ⋅ Secureworks ⋅ SecureWorks' Counter Threat Unit Research Team @online{team:20221209:drokbk:0f8a8ad,
author = {SecureWorks' Counter Threat Unit Research Team},
title = {{Drokbk Malware Uses GitHub as Dead Drop Resolver}},
date = {2022-12-09},
organization = {Secureworks},
url = {https://www.secureworks.com/blog/drokbk-malware-uses-github-as-dead-drop-resolver},
language = {English},
urldate = {2023-01-03}
}
Drokbk Malware Uses GitHub as Dead Drop Resolver Drokbk |
2022-09-26 ⋅ CrowdStrike ⋅ Ioan Iacob, Iulian Madalin Ionita @online{iacob:20220926:anatomy:248e6ff,
author = {Ioan Iacob and Iulian Madalin Ionita},
title = {{The Anatomy of Wiper Malware, Part 3: Input/Output Controls}},
date = {2022-09-26},
organization = {CrowdStrike},
url = {https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-3/},
language = {English},
urldate = {2022-09-29}
}
The Anatomy of Wiper Malware, Part 3: Input/Output Controls CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper Meteor Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-08-12 ⋅ CrowdStrike ⋅ Ioan Iacob, Iulian Madalin Ionita @online{iacob:20220812:anatomy:b13ce32,
author = {Ioan Iacob and Iulian Madalin Ionita},
title = {{The Anatomy of Wiper Malware, Part 1: Common Techniques}},
date = {2022-08-12},
organization = {CrowdStrike},
url = {https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-1/},
language = {English},
urldate = {2023-01-19}
}
The Anatomy of Wiper Malware, Part 1: Common Techniques Apostle CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper IsraBye KillDisk Meteor Olympic Destroyer Ordinypt Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-06-20 ⋅ Infinitum IT ⋅ infinitum IT @online{it:20220620:charming:b356ff2,
author = {infinitum IT},
title = {{Charming Kitten (APT35)}},
date = {2022-06-20},
organization = {Infinitum IT},
url = {https://www.infinitumit.com.tr/apt-35/},
language = {Turkish},
urldate = {2022-06-22}
}
Charming Kitten (APT35) LaZagne DownPaper MimiKatz pupy |
2022-06-15 ⋅ Volexity ⋅ Steven Adair, Thomas Lancaster, Volexity Threat Research @online{adair:20220615:driftingcloud:58322a8,
author = {Steven Adair and Thomas Lancaster and Volexity Threat Research},
title = {{DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach}},
date = {2022-06-15},
organization = {Volexity},
url = {https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/},
language = {English},
urldate = {2022-06-17}
}
DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach pupy Sliver |
2022-05-23 ⋅ Trend Micro ⋅ Daniel Lunghi, Jaromír Hořejší @techreport{lunghi:20220523:operation:e3c402b,
author = {Daniel Lunghi and Jaromír Hořejší},
title = {{Operation Earth Berberoka}},
date = {2022-05-23},
institution = {Trend Micro},
url = {https://documents.trendmicro.com/assets/white_papers/wp-operation-earth-berberoka.pdf},
language = {English},
urldate = {2022-07-25}
}
Operation Earth Berberoka reptile oRAT Ghost RAT PlugX pupy Earth Berberoka |
2022-04-28 ⋅ Fortinet ⋅ Gergely Revay @online{revay:20220428:overview:0ac963f,
author = {Gergely Revay},
title = {{An Overview of the Increasing Wiper Malware Threat}},
date = {2022-04-28},
organization = {Fortinet},
url = {https://www.fortinet.com/blog/threat-research/the-increasing-wiper-malware-threat},
language = {English},
urldate = {2022-04-29}
}
An Overview of the Increasing Wiper Malware Threat AcidRain CaddyWiper DistTrack DoubleZero EternalPetya HermeticWiper IsaacWiper Olympic Destroyer Ordinypt WhisperGate ZeroCleare |
2022-04-27 ⋅ Trendmicro ⋅ Trendmicro @online{trendmicro:20220427:iocs:b6d7ab5,
author = {Trendmicro},
title = {{IOCs for Earth Berberoka - Linux}},
date = {2022-04-27},
organization = {Trendmicro},
url = {https://documents.trendmicro.com/assets/txt/earth-berberoka-linux-iocs-2.txt},
language = {English},
urldate = {2022-07-25}
}
IOCs for Earth Berberoka - Linux Rekoobe pupy Earth Berberoka |
2022-03-30 ⋅ Recorded Future ⋅ Insikt Group @techreport{group:20220330:social:e36c4e5,
author = {Insikt Group},
title = {{Social Engineering Remains Key Tradecraft for Iranian APTs}},
date = {2022-03-30},
institution = {Recorded Future},
url = {https://go.recordedfuture.com/hubfs/reports/cta-2022-0330.pdf},
language = {English},
urldate = {2022-04-05}
}
Social Engineering Remains Key Tradecraft for Iranian APTs Liderc pupy |
2022-03-09 ⋅ eSentire ⋅ eSentire Threat Response Unit (TRU) @online{tru:20220309:exploitation:83cd523,
author = {eSentire Threat Response Unit (TRU)},
title = {{Exploitation of VMware Horizon Servers by TunnelVision Threat Actor}},
date = {2022-03-09},
organization = {eSentire},
url = {https://www.esentire.com/blog/exploitation-of-vmware-horizon-servers-by-tunnelvision-threat-actor},
language = {English},
urldate = {2023-09-17}
}
Exploitation of VMware Horizon Servers by TunnelVision Threat Actor Drokbk |
2022-03-08 ⋅ Cylera ⋅ Cylera @techreport{cylera:20220308:link:2b7c36f,
author = {Cylera},
title = {{The link between Kwampirs (Orangeworm) and Shamoon APTs}},
date = {2022-03-08},
institution = {Cylera},
url = {https://resources.cylera.com/hubfs/Cylera%20Labs/Cylera%20Labs%20Kwampirs%20Shamoon%20Technical%20Report.pdf},
language = {English},
urldate = {2022-03-10}
}
The link between Kwampirs (Orangeworm) and Shamoon APTs DistTrack Kwampirs |
2022-01-11 ⋅ Check Point ⋅ Check Point Research @online{research:20220111:apt35:c5e9ff3,
author = {Check Point Research},
title = {{APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit}},
date = {2022-01-11},
organization = {Check Point},
url = {https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/},
language = {English},
urldate = {2022-01-18}
}
APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit APT35 |
2021-08-05 ⋅ Symantec ⋅ Threat Hunter Team @techreport{team:20210805:attacks:c2d7348,
author = {Threat Hunter Team},
title = {{Attacks Against Critical Infrastructure: A Global Concern}},
date = {2021-08-05},
institution = {Symantec},
url = {https://symantec.broadcom.com/hubfs/Attacks-Against-Critical_Infrastructrure.pdf},
language = {English},
urldate = {2021-08-06}
}
Attacks Against Critical Infrastructure: A Global Concern BlackEnergy DarkSide DistTrack Stuxnet |
2021-07-28 ⋅ Proofpoint ⋅ Joshua Miller, Michael Raggi, Crista Giering @online{miller:20210728:i:23e9aad,
author = {Joshua Miller and Michael Raggi and Crista Giering},
title = {{I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona}},
date = {2021-07-28},
organization = {Proofpoint},
url = {https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media},
language = {English},
urldate = {2021-07-29}
}
I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona Liderc SysKit |
2021-07-15 ⋅ Facebook ⋅ Mike Dvilyanski, David Agranovich @online{dvilyanski:20210715:taking:10d945f,
author = {Mike Dvilyanski and David Agranovich},
title = {{Taking Action Against Hackers in Iran}},
date = {2021-07-15},
organization = {Facebook},
url = {https://about.fb.com/news/2021/07/taking-action-against-hackers-in-iran/},
language = {English},
urldate = {2021-07-20}
}
Taking Action Against Hackers in Iran Liderc SysKit |
2020-02-13 ⋅ Qianxin ⋅ Qi Anxin Threat Intelligence Center @techreport{center:20200213:report:146d333,
author = {Qi Anxin Threat Intelligence Center},
title = {{APT Report 2019}},
date = {2020-02-13},
institution = {Qianxin},
url = {https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf},
language = {English},
urldate = {2020-02-27}
}
APT Report 2019 Chrysaor Exodus Dacls VPNFilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy |
2020-02-10 ⋅ ZDNet ⋅ Catalin Cimpanu @online{cimpanu:20200210:fbi:1904430,
author = {Catalin Cimpanu},
title = {{FBI warns about ongoing attacks against software supply chain companies}},
date = {2020-02-10},
organization = {ZDNet},
url = {https://www.zdnet.com/article/fbi-warns-about-ongoing-attacks-against-software-supply-chain-companies/},
language = {English},
urldate = {2020-02-11}
}
FBI warns about ongoing attacks against software supply chain companies DistTrack Kwampirs |
2020-01-23 ⋅ Recorded Future ⋅ Insikt Group @techreport{group:20200123:european:c3ca9e3,
author = {Insikt Group},
title = {{European Energy Sector Organization Targeted by PupyRAT Malware in Late 2019}},
date = {2020-01-23},
institution = {Recorded Future},
url = {https://go.recordedfuture.com/hubfs/reports/cta-2020-0123.pdf},
language = {English},
urldate = {2020-01-27}
}
European Energy Sector Organization Targeted by PupyRAT Malware in Late 2019 pupy pupy pupy |
2019-12-21 ⋅ MalwareInDepth ⋅ Myrtus 0x0 @online{0x0:20191221:shamoon:eb1828b,
author = {Myrtus 0x0},
title = {{Shamoon 2012 Complete Analysis}},
date = {2019-12-21},
organization = {MalwareInDepth},
url = {https://malwareindepth.com/shamoon-2012/},
language = {English},
urldate = {2020-01-12}
}
Shamoon 2012 Complete Analysis DistTrack |
2019-11-19 ⋅ FireEye ⋅ Kelli Vanderlee, Nalani Fraser @techreport{vanderlee:20191119:achievement:6be19eb,
author = {Kelli Vanderlee and Nalani Fraser},
title = {{Achievement Unlocked: Chinese Cyber Espionage Evolves to Support Higher Level Missions}},
date = {2019-11-19},
institution = {FireEye},
url = {https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf},
language = {English},
urldate = {2021-03-02}
}
Achievement Unlocked: Chinese Cyber Espionage Evolves to Support Higher Level Missions MESSAGETAP TSCookie ACEHASH CHINACHOPPER Cobalt Strike Derusbi Empire Downloader Ghost RAT HIGHNOON HTran MimiKatz NetWire RC poisonplug Poison Ivy pupy Quasar RAT ZXShell |
2019-09-25 ⋅ Twitter (@QW5kcmV3) ⋅ Andrew Thompson @online{thompson:20190925:apt35:b6b82f0,
author = {Andrew Thompson},
title = {{Tweet on APT35 activity}},
date = {2019-09-25},
organization = {Twitter (@QW5kcmV3)},
url = {https://twitter.com/QW5kcmV3/status/1176861114535165952},
language = {English},
urldate = {2020-01-08}
}
Tweet on APT35 activity SysKit |
2019-09-24 ⋅ Cisco Talos ⋅ Warren Mercer, Paul Rascagnères, Jungsoo An @online{mercer:20190924:how:ac2b53e,
author = {Warren Mercer and Paul Rascagnères and Jungsoo An},
title = {{How Tortoiseshell created a fake veteran hiring website to host malware}},
date = {2019-09-24},
organization = {Cisco Talos},
url = {https://blog.talosintelligence.com/2019/09/tortoiseshell-fake-veterans.html},
language = {English},
urldate = {2019-12-02}
}
How Tortoiseshell created a fake veteran hiring website to host malware Liderc SysKit |
2019-09-24 ⋅ DARKReading ⋅ Kelly Jackson Higgins @online{higgins:20190924:iranian:4966d90,
author = {Kelly Jackson Higgins},
title = {{Iranian Government Hackers Target US Veterans}},
date = {2019-09-24},
organization = {DARKReading},
url = {https://www.darkreading.com/threat-intelligence/iranian-government-hackers-target-us-veterans/d/d-id/1335897},
language = {English},
urldate = {2020-03-22}
}
Iranian Government Hackers Target US Veterans SysKit Tortoiseshell |
2019-09-18 ⋅ Symantec ⋅ Security Response Attack Investigation Team @online{team:20190918:tortoiseshell:4881fc1,
author = {Security Response Attack Investigation Team},
title = {{Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks}},
date = {2019-09-18},
organization = {Symantec},
url = {https://www.symantec.com/blogs/threat-intelligence/tortoiseshell-apt-supply-chain},
language = {English},
urldate = {2020-01-13}
}
Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks SysKit Tortoiseshell |
2019-08-22 ⋅ Github (n1nj4sec) ⋅ n1nj4sec @online{n1nj4sec:20190822:pupy:a822ccd,
author = {n1nj4sec},
title = {{Pupy RAT}},
date = {2019-08-22},
organization = {Github (n1nj4sec)},
url = {https://github.com/n1nj4sec/pupy},
language = {English},
urldate = {2020-01-07}
}
Pupy RAT pupy pupy pupy |
2019-03-27 ⋅ Symantec ⋅ Security Response Attack Investigation Team @online{team:20190327:elfin:836cc39,
author = {Security Response Attack Investigation Team},
title = {{Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.}},
date = {2019-03-27},
organization = {Symantec},
url = {https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage},
language = {English},
urldate = {2020-01-06}
}
Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S. DarkComet Nanocore RAT pupy Quasar RAT Remcos TURNEDUP APT33 |
2019-03-27 ⋅ Microsoft ⋅ Tom Burt @online{burt:20190327:new:9ba6b3b,
author = {Tom Burt},
title = {{New steps to protect customers from hacking}},
date = {2019-03-27},
organization = {Microsoft},
url = {https://blogs.microsoft.com/on-the-issues/2019/03/27/new-steps-to-protect-customers-from-hacking/},
language = {English},
urldate = {2020-01-13}
}
New steps to protect customers from hacking APT35 Charming Kitten Cleaver |
2019-03-27 ⋅ Symantec ⋅ Critical Attack Discovery and Intelligence Team @online{team:20190327:elfin:d90a330,
author = {Critical Attack Discovery and Intelligence Team},
title = {{Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.}},
date = {2019-03-27},
organization = {Symantec},
url = {https://symantec-blogs.broadcom.com/blogs/threat-intelligence/elfin-apt33-espionage},
language = {English},
urldate = {2020-04-21}
}
Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S. DarkComet MimiKatz Nanocore RAT NetWire RC pupy Quasar RAT Remcos StoneDrill TURNEDUP APT33 |
2019 ⋅ Council on Foreign Relations ⋅ Cyber Operations Tracker @online{tracker:2019:magic:f997203,
author = {Cyber Operations Tracker},
title = {{Magic Hound}},
date = {2019},
organization = {Council on Foreign Relations},
url = {https://www.cfr.org/interactive/cyber-operations/magic-hound},
language = {English},
urldate = {2019-12-20}
}
Magic Hound APT35 Cleaver |
2019 ⋅ MITRE ⋅ MITRE ATT&CK @online{attck:2019:magic:f2f07ab,
author = {MITRE ATT&CK},
title = {{Group description: Magic Hound}},
date = {2019},
organization = {MITRE},
url = {https://attack.mitre.org/groups/G0059/},
language = {English},
urldate = {2019-12-20}
}
Group description: Magic Hound APT35 Cleaver |
2018-12-21 ⋅ FireEye ⋅ Geoff Ackerman, Rick Cole, Andrew Thompson, Alex Orleans, Nick Carr @online{ackerman:20181221:overruled:74ac7b4,
author = {Geoff Ackerman and Rick Cole and Andrew Thompson and Alex Orleans and Nick Carr},
title = {{OVERRULED: Containing a Potentially Destructive Adversary}},
date = {2018-12-21},
organization = {FireEye},
url = {https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html},
language = {English},
urldate = {2019-12-20}
}
OVERRULED: Containing a Potentially Destructive Adversary POWERTON PoshC2 pupy |
2018-12-14 ⋅ Symantec ⋅ Critical Attack Discovery and Intelligence Team @online{team:20181214:shamoon:1f24fa5,
author = {Critical Attack Discovery and Intelligence Team},
title = {{Shamoon: Destructive Threat Re-Emerges with New Sting in its Tail}},
date = {2018-12-14},
organization = {Symantec},
url = {https://symantec-blogs.broadcom.com/blogs/threat-intelligence/shamoon-destructive-threat-re-emerges-new-sting-its-tail},
language = {English},
urldate = {2020-04-21}
}
Shamoon: Destructive Threat Re-Emerges with New Sting in its Tail DistTrack Filerase StoneDrill OilRig |
2018-12-13 ⋅ Palo Alto Networks Unit 42 ⋅ Robert Falcone @online{falcone:20181213:shamoon:1623fe7,
author = {Robert Falcone},
title = {{Shamoon 3 Targets Oil and Gas Organization}},
date = {2018-12-13},
organization = {Palo Alto Networks Unit 42},
url = {https://unit42.paloaltonetworks.com/shamoon-3-targets-oil-gas-organization/},
language = {English},
urldate = {2020-01-10}
}
Shamoon 3 Targets Oil and Gas Organization DistTrack |
2018 ⋅ Council on Foreign Relations ⋅ Cyber Operations Tracker @online{tracker:2018:35:7c5b679,
author = {Cyber Operations Tracker},
title = {{APT 35}},
date = {2018},
organization = {Council on Foreign Relations},
url = {https://www.cfr.org/cyber-operations/apt-35},
language = {English},
urldate = {2022-07-29}
}
APT 35 APT35 |
2018 ⋅ FireEye ⋅ FireEye @techreport{fireeye:2018:mtrends2018:f07ca60,
author = {FireEye},
title = {{M-TRENDS2018}},
date = {2018},
institution = {FireEye},
url = {https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf},
language = {English},
urldate = {2020-01-08}
}
M-TRENDS2018 APT35 OilRig |
2017-03-26 ⋅ Palo Alto Networks Unit 42 ⋅ Robert Falcone, Bryan Lee @online{falcone:20170326:shamoon:8a62f1a,
author = {Robert Falcone and Bryan Lee},
title = {{Shamoon 2: Delivering Disttrack}},
date = {2017-03-26},
organization = {Palo Alto Networks Unit 42},
url = {http://researchcenter.paloaltonetworks.com/2017/03/unit42-shamoon-2-delivering-disttrack/},
language = {English},
urldate = {2019-12-20}
}
Shamoon 2: Delivering Disttrack DistTrack |
2017-03-14 ⋅ FireEye ⋅ FireEye @online{fireeye:20170314:mtrend:0ea7d30,
author = {FireEye},
title = {{M-Trend 2017: A View From the Front Lines}},
date = {2017-03-14},
organization = {FireEye},
url = {https://content.fireeye.com/m-trends/rpt-m-trends-2017},
language = {English},
urldate = {2020-06-03}
}
M-Trend 2017: A View From the Front Lines DistTrack Powersniff FIN8 |
2017-02-27 ⋅ Symantec ⋅ A L Johnson @online{johnson:20170227:shamoon:0188f39,
author = {A L Johnson},
title = {{Shamoon: Multi-staged destructive attacks limited to specific targets}},
date = {2017-02-27},
organization = {Symantec},
url = {https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=5758557d-6e3a-4174-90f3-fa92a712ecd9&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments},
language = {English},
urldate = {2020-04-21}
}
Shamoon: Multi-staged destructive attacks limited to specific targets DistTrack MimiKatz Rocket Kitten |
2017-02-16 ⋅ SecurityAffairs ⋅ Pierluigi Paganini @online{paganini:20170216:iranian:917f46c,
author = {Pierluigi Paganini},
title = {{Iranian hackers behind the Magic Hound campaign linked to Shamoon}},
date = {2017-02-16},
organization = {SecurityAffairs},
url = {https://securityaffairs.co/wordpress/56348/intelligence/magic-hound-campaign.html},
language = {English},
urldate = {2022-07-29}
}
Iranian hackers behind the Magic Hound campaign linked to Shamoon pupy APT35 |
2017-02-15 ⋅ Palo Alto Networks Unit 42 ⋅ Bryan Lee, Robert Falcone @online{lee:20170215:magic:e0b1b72,
author = {Bryan Lee and Robert Falcone},
title = {{Magic Hound Campaign Attacks Saudi Targets}},
date = {2017-02-15},
organization = {Palo Alto Networks Unit 42},
url = {https://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/},
language = {English},
urldate = {2019-09-22}
}
Magic Hound Campaign Attacks Saudi Targets Leash MPKBot pupy Rocket Kitten |
2017-02-15 ⋅ Palo Alto Networks Unit 42 ⋅ Bryan Lee, Robert Falcone @online{lee:20170215:magic:d143d8f,
author = {Bryan Lee and Robert Falcone},
title = {{Magic Hound Campaign Attacks Saudi Targets}},
date = {2017-02-15},
organization = {Palo Alto Networks Unit 42},
url = {https://unit42.paloaltonetworks.com/unit42-magic-hound-campaign-attacks-saudi-targets/},
language = {English},
urldate = {2020-01-09}
}
Magic Hound Campaign Attacks Saudi Targets APT35 Cleaver |
2017-02-15 ⋅ Secureworks ⋅ SecureWorks' Counter Threat Unit Research Team @online{team:20170215:iranian:004ec5a,
author = {SecureWorks' Counter Threat Unit Research Team},
title = {{Iranian PupyRAT Bites Middle Eastern Organizations}},
date = {2017-02-15},
organization = {Secureworks},
url = {https://www.secureworks.com/blog/iranian-pupyrat-bites-middle-eastern-organizations},
language = {English},
urldate = {2019-10-23}
}
Iranian PupyRAT Bites Middle Eastern Organizations pupy Cleaver |
2017-02-10 ⋅ JPCERT/CC ⋅ Shusei Tomonaga @online{tomonaga:20170210:malware:4f2c9aa,
author = {Shusei Tomonaga},
title = {{Malware that infects using PowerSploit}},
date = {2017-02-10},
organization = {JPCERT/CC},
url = {https://blog.cyber4sight.com/2017/02/malicious-powershell-script-analysis-indicates-shamoon-actors-used-pupy-rat/},
language = {Japanese},
urldate = {2020-01-08}
}
Malware that infects using PowerSploit pupy |
2017-02-05 ⋅ VinRansomware ⋅ Gregory Paul, Shaunak @online{paul:20170205:detailed:3a65aaf,
author = {Gregory Paul and Shaunak},
title = {{Detailed threat analysis of Shamoon 2.0 Malware}},
date = {2017-02-05},
organization = {VinRansomware},
url = {http://www.vinransomware.com/blog/detailed-threat-analysis-of-shamoon-2-0-malware},
language = {English},
urldate = {2020-01-09}
}
Detailed threat analysis of Shamoon 2.0 Malware DistTrack |
2017-01-23 ⋅ Symantec ⋅ Symantec Security Response @online{response:20170123:greenbug:a118a76,
author = {Symantec Security Response},
title = {{Greenbug cyberespionage group targeting Middle East, possible links to Shamoon}},
date = {2017-01-23},
organization = {Symantec},
url = {https://web.archive.org/web/20190331181353/https://www.symantec.com/connect/blogs/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon},
language = {English},
urldate = {2020-04-21}
}
Greenbug cyberespionage group targeting Middle East, possible links to Shamoon DistTrack ISMDoor Greenbug |
2017-01-23 ⋅ Symantec ⋅ Symantec Security Response @online{response:20170123:greenbug:96eab4c,
author = {Symantec Security Response},
title = {{Greenbug cyberespionage group targeting Middle East, possible links to Shamoon}},
date = {2017-01-23},
organization = {Symantec},
url = {https://www.symantec.com/connect/blogs/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon},
language = {English},
urldate = {2020-01-13}
}
Greenbug cyberespionage group targeting Middle East, possible links to Shamoon DistTrack ISMDoor Greenbug |
2017-01-09 ⋅ Palo Alto Networks Unit 42 ⋅ Robert Falcone @online{falcone:20170109:second:2e36550,
author = {Robert Falcone},
title = {{Second Wave of Shamoon 2 Attacks Identified}},
date = {2017-01-09},
organization = {Palo Alto Networks Unit 42},
url = {https://unit42.paloaltonetworks.com/unit42-second-wave-shamoon-2-attacks-identified/},
language = {English},
urldate = {2020-01-07}
}
Second Wave of Shamoon 2 Attacks Identified DistTrack |
2016-12-03 ⋅ Coding and Security ⋅ Coding, Security @online{coding:20161203:sophisticated:af2cbb4,
author = {Coding and Security},
title = {{"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis}},
date = {2016-12-03},
organization = {Coding and Security},
url = {https://www.codeandsec.com/Sophisticated-CyberWeapon-Shamoon-2-Malware-Analysis},
language = {English},
urldate = {2020-01-08}
}
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis DistTrack |
2016-11-30 ⋅ Palo Alto Networks Unit 42 ⋅ Robert Falcone @online{falcone:20161130:shamoon:6befcf1,
author = {Robert Falcone},
title = {{Shamoon 2: Return of the Disttrack Wiper}},
date = {2016-11-30},
organization = {Palo Alto Networks Unit 42},
url = {http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-disttrack-wiper/?adbsc=social68389776&adbid=804134348374970368&adbpl=tw&adbpr=4487645412},
language = {English},
urldate = {2019-12-20}
}
Shamoon 2: Return of the Disttrack Wiper DistTrack |
2016-11-30 ⋅ Symantec ⋅ A L Johnson @online{johnson:20161130:shamoon:50feb7c,
author = {A L Johnson},
title = {{Shamoon: Back from the dead and destructive as ever}},
date = {2016-11-30},
organization = {Symantec},
url = {https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=ad6f8259-2bb4-4f7f-b8e1-710b35a4cbed&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments},
language = {English},
urldate = {2020-04-21}
}
Shamoon: Back from the dead and destructive as ever DistTrack OilRig |
2015-11 ⋅ Check Point ⋅ Check Point @techreport{point:201511:rocket:2e2b21c,
author = {Check Point},
title = {{ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES}},
date = {2015-11},
institution = {Check Point},
url = {https://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf},
language = {English},
urldate = {2020-01-07}
}
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES FireMalv MPKBot Woolger Cleaver Rocket Kitten |
2012-08-17 ⋅ Contagiodump Blog ⋅ Mila Parkour @online{parkour:20120817:shamoon:efffab1,
author = {Mila Parkour},
title = {{Shamoon or DistTrack.A samples}},
date = {2012-08-17},
organization = {Contagiodump Blog},
url = {http://contagiodump.blogspot.com/2012/08/shamoon-or-disttracka-samples.html},
language = {English},
urldate = {2019-12-20}
}
Shamoon or DistTrack.A samples DistTrack |
2012-08-16 ⋅ Symantec ⋅ Symantec Security Response @online{response:20120816:shamoon:8f8fe97,
author = {Symantec Security Response},
title = {{The Shamoon Attacks}},
date = {2012-08-16},
organization = {Symantec},
url = {https://web.archive.org/web/20120818235442/https://www.symantec.com/connect/blogs/shamoon-attacks},
language = {English},
urldate = {2020-04-21}
}
The Shamoon Attacks DistTrack OilRig |
2012-08-16 ⋅ Kaspersky Labs ⋅ GReAT @online{great:20120816:shamoon:143efb8,
author = {GReAT},
title = {{Shamoon the Wiper – Copycats at Work}},
date = {2012-08-16},
organization = {Kaspersky Labs},
url = {https://securelist.com/shamoon-the-wiper-copycats-at-work/},
language = {English},
urldate = {2019-12-20}
}
Shamoon the Wiper – Copycats at Work DistTrack |