SYMBOLCOMMON_NAMEaka. SYNONYMS

Dust Storm  (Back to overview)

aka: G0031

Threat actors behind the Operation Dust Storm have been active since at least 2010, the hackers targeted several organizations in Japan, South Korea, the US, Europe, and other Asian countries.


Associated Families
win.misdat

References
2019MITREMITRE ATT&CK
@online{attck:2019:dust:699660d, author = {MITRE ATT&CK}, title = {{Group description: Dust Storm}}, date = {2019}, organization = {MITRE}, url = {https://attack.mitre.org/groups/G0031/}, language = {English}, urldate = {2019-12-20} } Group description: Dust Storm
Dust Storm
2016-02-23CylanceJon Gross, Cylance SPEAR Team
@techreport{gross:20160223:operation:424641b, author = {Jon Gross and Cylance SPEAR Team}, title = {{Operation Dust Storm}}, date = {2016-02-23}, institution = {Cylance}, url = {https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdf}, language = {English}, urldate = {2020-01-09} } Operation Dust Storm
Misdat Poldat Dust Storm
2011-06-29SymantecJohn McDonald
@online{mcdonald:20110629:inside:b955948, author = {John McDonald}, title = {{Inside a Back Door Attack}}, date = {2011-06-29}, organization = {Symantec}, url = {https://web.archive.org/web/20140816135909/https://www.symantec.com/connect/blogs/inside-back-door-attack}, language = {English}, urldate = {2020-04-21} } Inside a Back Door Attack
Ghost RAT Dust Storm
2011-06-29SymantecJohn McDonald
@online{mcdonald:20110629:inside:a85984a, author = {John McDonald}, title = {{Inside a Back Door Attack}}, date = {2011-06-29}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/inside-back-door-attack}, language = {English}, urldate = {2020-01-06} } Inside a Back Door Attack
Dust Storm

Credits: MISP Project