SYMBOLCOMMON_NAMEaka. SYNONYMS

Madi  (Back to overview)


Kaspersky Lab and Seculert worked together to sinkhole the Madi Command & Control (C&C) servers to monitor the campaign. Kaspersky Lab and Seculert identified more than 800 victims located in Iran, Israel and select countries across the globe connecting to the C&Cs over the past eight months. Statistics from the sinkhole revealed that the victims were primarily business people working on Iranian and Israeli critical infrastructure projects, Israeli financial institutions, Middle Eastern engineering students, and various government agencies communicating in the Middle East. Common applications and websites that were spied on include accounts on Gmail, Hotmail, Yahoo! Mail, ICQ, Skype, Google+, and Facebook. Surveillance is also performed over integrated ERP/CRM systems, business contracts, and financial management systems.


Associated Families

There are currently no families associated with this actor.


References
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Madi
Madi
2012-07-26Kaspersky LabsGReAT
The Madi Campaign – Part II
Madi
2012-07-25ThreatpostChris Brook
New and Improved Madi Spyware Campaign Continues
Madi
2012-07-18SymantecSecurity Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi
2012-07-17Kaspersky LabsKaspersky
Kaspersky Lab and Seculert Announce ‘Madi,’ a Newly Discovered Cyber-Espionage Campaign in the Middle East
Madi
2012-07-17Kaspersky LabsGReAT
The Madi Campaign – Part I
Madi
2012-07-17SymantecSymantec Security Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi

Credits: MISP Project