SYMBOLCOMMON_NAMEaka. SYNONYMS

TetrisPhantom  (Back to overview)


TetrisPhantom relies on compromising of certain type of secure USB drives that provide hardware encryption and is commonly used by government organizations. While investigating this threat, experts identified an entire spying campaign that uses a range of malicious modules to execute commands, collect files and information from compromised computers and transfer them to other machines also using secure USB drives.


Associated Families

There are currently no families associated with this actor.


References
2023-10-27Kaspersky LabsKaspersky Team
Security Analyst Summit 2023: key research
TetrisPhantom
2023-10-17Kaspersky LabsGReAT
APT trends report Q3 2023
BadRory TetrisPhantom

Credits: MISP Project