SYMBOL | COMMON_NAME | aka. SYNONYMS |
Kaspersky Lab and Seculert worked together to sinkhole the Madi Command & Control (C&C) servers to monitor the campaign. Kaspersky Lab and Seculert identified more than 800 victims located in Iran, Israel and select countries across the globe connecting to the C&Cs over the past eight months. Statistics from the sinkhole revealed that the victims were primarily business people working on Iranian and Israeli critical infrastructure projects, Israeli financial institutions, Middle Eastern engineering students, and various government agencies communicating in the Middle East. Common applications and websites that were spied on include accounts on Gmail, Hotmail, Yahoo! Mail, ICQ, Skype, Google+, and Facebook. Surveillance is also performed over integrated ERP/CRM systems, business contracts, and financial management systems.
There are currently no families associated with this actor.
2019-01-01
⋅
Council on Foreign Relations
⋅
Madi Madi |
2012-07-26
⋅
Kaspersky Labs
⋅
The Madi Campaign – Part II Madi |
2012-07-25
⋅
Threatpost
⋅
New and Improved Madi Spyware Campaign Continues Madi |
2012-07-18
⋅
Symantec
⋅
The Madi Attacks: Series of Social Engineering Campaigns Madi |
2012-07-17
⋅
Kaspersky Labs
⋅
Kaspersky Lab and Seculert Announce ‘Madi,’ a Newly Discovered Cyber-Espionage Campaign in the Middle East Madi |
2012-07-17
⋅
Kaspersky Labs
⋅
The Madi Campaign – Part I Madi |
2012-07-17
⋅
Symantec
⋅
The Madi Attacks: Series of Social Engineering Campaigns Madi |