SYMBOL | COMMON_NAME | aka. SYNONYMS |
Fishing Elephant is a threat actor that primarily targets victims in Bangladesh and Pakistan. They rely on consistent TTPs, including payload and communication patterns, while occasionally incorporating new techniques such as geo-fencing and hiding executables within certificate files. Their tool of choice is AresRAT, which they deliver through platforms like Heroku and Dropbox. Recently, they have shifted their focus to government and diplomatic entities in Turkey, Pakistan, Bangladesh, Ukraine, and China.
There are currently no families associated with this actor.
2022-04-27
⋅
Kaspersky Labs
⋅
APT trends report Q1 2022 Fishing Elephant |
2020-04-30
⋅
Kaspersky Labs
⋅
APT trends report Q1 2020 Fishing Elephant |