SYMBOLCOMMON_NAMEaka. SYNONYMS

AridViper  (Back to overview)

aka: Desert Falcon, Arid Viper, APT-C-23


Associated Families
apk.glancelove apk.spyc23 apk.unidentified_004

References
2020-09-30ESET ResearchLukáš Štefanko
@online{tefanko:20200930:aptc23:033fea8, author = {Lukáš Štefanko}, title = {{APT‑C‑23 group evolves its Android spyware}}, date = {2020-09-30}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2020/09/30/aptc23-group-evolves-its-android-spyware/}, language = {English}, urldate = {2020-10-04} } APT‑C‑23 group evolves its Android spyware
SpyC23
2020-02-16Check Point ResearchCheck Point Research
@online{research:20200216:hamas:c7c85d6, author = {Check Point Research}, title = {{Hamas Android Malware On IDF Soldiers-This is How it Happened}}, date = {2020-02-16}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2020/hamas-android-malware-on-idf-soldiers-this-is-how-it-happened/}, language = {English}, urldate = {2020-02-25} } Hamas Android Malware On IDF Soldiers-This is How it Happened
Unidentified APK 004
2018-07-03HaaretzYaniv Kubovich
@online{kubovich:20180703:hamas:372b78f, author = {Yaniv Kubovich}, title = {{Hamas Cyber Ops Spied on Hundreds of Israeli Soldiers Using Fake World Cup, Dating Apps}}, date = {2018-07-03}, organization = {Haaretz}, url = {https://www.haaretz.com/israel-news/hamas-cyber-ops-spied-on-israeli-soldiers-using-fake-world-cup-app-1.6241773}, language = {English}, urldate = {2019-11-29} } Hamas Cyber Ops Spied on Hundreds of Israeli Soldiers Using Fake World Cup, Dating Apps
GlanceLove
2018-07-03ClearSkyClearSky Research Team
@online{team:20180703:infrastructure:139fa0f, author = {ClearSky Research Team}, title = {{Infrastructure and Samples of Hamas’ Android Malware Targeting Israeli Soldiers}}, date = {2018-07-03}, organization = {ClearSky}, url = {https://www.clearskysec.com/glancelove/}, language = {English}, urldate = {2019-10-15} } Infrastructure and Samples of Hamas’ Android Malware Targeting Israeli Soldiers
GlanceLove
2017-06-19Cisco TalosPaul Rascagnères, Warren Mercer, Emmanuel Tacheau, Vanja Svajcer, Martin Lee
@online{rascagnres:20170619:delphi:fdf6859, author = {Paul Rascagnères and Warren Mercer and Emmanuel Tacheau and Vanja Svajcer and Martin Lee}, title = {{Delphi Used To Score Against Palestine}}, date = {2017-06-19}, organization = {Cisco Talos}, url = {http://blog.talosintelligence.com/2017/06/palestine-delphi.html}, language = {English}, urldate = {2019-07-27} } Delphi Used To Score Against Palestine
Micropsia AridViper
2017-06-14ThreatConnectThreatConnect Research Team
@online{team:20170614:phantom:0078e23, author = {ThreatConnect Research Team}, title = {{Phantom of the Opaera: New KASPERAGENT Malware Campaign}}, date = {2017-06-14}, organization = {ThreatConnect}, url = {https://www.threatconnect.com/blog/kasperagent-malware-campaign/}, language = {English}, urldate = {2019-10-14} } Phantom of the Opaera: New KASPERAGENT Malware Campaign
KasperAgent AridViper
2017-02-16LookoutMichael Flossman
@online{flossman:20170216:viperrat:85bc048, author = {Michael Flossman}, title = {{ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar}}, date = {2017-02-16}, organization = {Lookout}, url = {https://blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/}, language = {English}, urldate = {2020-01-13} } ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar
Viper RAT AridViper
2017-02-16Kaspersky LabsIDF C4I, Ido Naor
@online{c4i:20170216:breaking:b65439a, author = {IDF C4I and Ido Naor}, title = {{Breaking The Weakest Link Of The Strongest Chain}}, date = {2017-02-16}, organization = {Kaspersky Labs}, url = {https://securelist.com/breaking-the-weakest-link-of-the-strongest-chain/77562/}, language = {English}, urldate = {2019-12-20} } Breaking The Weakest Link Of The Strongest Chain
GlanceLove
2017-02-16Kaspersky LabsIDF C4I, Ido Naor
@online{c4i:20170216:breaking:cc7bead, author = {IDF C4I and Ido Naor}, title = {{Breaking The Weakest Link Of The Strongest Chain}}, date = {2017-02-16}, organization = {Kaspersky Labs}, url = {https://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/}, language = {English}, urldate = {2019-12-20} } Breaking The Weakest Link Of The Strongest Chain
Viper RAT AridViper
2017-02-05IDFIDF
@online{idf:20170205:hamas:b96235f, author = {IDF}, title = {{Hamas Uses Fake Facebook Profiles to Target Israeli Soldiers}}, date = {2017-02-05}, organization = {IDF}, url = {https://www.idf.il/en/minisites/hamas/hamas-uses-fake-facebook-profiles-to-target-israeli-soldiers/}, language = {English}, urldate = {2019-12-31} } Hamas Uses Fake Facebook Profiles to Target Israeli Soldiers
GlanceLove
2015-09-18ProofpointProofpoint Staff
@online{staff:20150918:operation:9af478b, author = {Proofpoint Staff}, title = {{Operation Arid Viper Slithers Back into View}}, date = {2015-09-18}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/Operation-Arid-Viper-Slithers-Back-Into-View}, language = {English}, urldate = {2019-12-20} } Operation Arid Viper Slithers Back into View
AridViper
2015-02-25Trend MicroTrend Micro Threat Research Team
@techreport{team:20150225:operation:3300d1e, author = {Trend Micro Threat Research Team}, title = {{OPERATION ARID VIPER: Bypassing the Iron Dome}}, date = {2015-02-25}, institution = {Trend Micro}, url = {http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf}, language = {English}, urldate = {2020-01-09} } OPERATION ARID VIPER: Bypassing the Iron Dome
AridViper
2015-02-19Security AffairsPierluigi Paganini
@online{paganini:20150219:arid:c2612d7, author = {Pierluigi Paganini}, title = {{Arid Viper – Israel entities targeted by malware packaged with sex video}}, date = {2015-02-19}, organization = {Security Affairs}, url = {http://securityaffairs.co/wordpress/33785/cyber-crime/arid-viper-israel-sex-video.html}, language = {English}, urldate = {2020-01-06} } Arid Viper – Israel entities targeted by malware packaged with sex video
AridViper
2015-02-18Trend MicroTrendmicro
@online{trendmicro:20150218:sexually:52507ce, author = {Trendmicro}, title = {{Sexually Explicit Material Used as Lures in Recent Cyber Attacks}}, date = {2015-02-18}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/sexually-explicit-material-used-as-lures-in-cyber-attacks?linkId=12425812}, language = {English}, urldate = {2020-01-08} } Sexually Explicit Material Used as Lures in Recent Cyber Attacks
AridViper
2015-02-17Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
@online{saad:20150217:desert:7bd7326, author = {Ghareeb Saad and Mohamad Amin Hasbini}, title = {{The Desert Falcons targeted attacks}}, date = {2015-02-17}, organization = {Kaspersky Labs}, url = {https://securelist.com/blog/research/68817/the-desert-falcons-targeted-attacks/}, language = {English}, urldate = {2019-12-20} } The Desert Falcons targeted attacks
AridViper
2015-02Kaspersky LabsGReAT
@techreport{great:201502:desert:0826d08, author = {GReAT}, title = {{The Desert Falcons Targeted Attacks}}, date = {2015-02}, institution = {Kaspersky Labs}, url = {https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064309/The-Desert-Falcons-targeted-attacks.pdf}, language = {English}, urldate = {2020-04-06} } The Desert Falcons Targeted Attacks
AridViper

Credits: MISP Project