SYMBOL | COMMON_NAME | aka. SYNONYMS |
Check Point Research discovered a new campaign against the Mongolian public sector, which takes advantage of the current Coronavirus scare, in order to deliver a previously unknown malware implant to the target. A closer look at this campaign allowed us to tie it to other operations which were carried out by the same anonymous group, dating back to at least 2016. Over the years, these operations targeted different sectors in multiple countries, such as Ukraine, Russia, and Belarus.
There are currently no families associated with this actor.
2021-10-26
⋅
Kaspersky Labs
⋅
APT trends report Q3 2021 Vicious Panda |
2021-03-10
⋅
ESET Research
⋅
Exchange servers under siege from at least 10 APT groups Microcin MimiKatz PlugX Winnti APT27 APT41 Calypso Tick ToddyCat Tonto Team Vicious Panda |
2020-09-03
⋅
Kaspersky Labs
⋅
IT threat evolution Q2 2020 PhantomLance Aria-body COMpfun Vicious Panda |
2020-07-29
⋅
Kaspersky Labs
⋅
APT trends report Q2 2020 Vicious Panda |
2020-06-19
⋅
Kaspersky Labs
⋅
Microcin is here Microcin Vicious Panda |
2020-05-14
⋅
ESET Research
⋅
Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia Microcin Vicious Panda |
2020-05-14
⋅
Avast Decoded
⋅
APT Group Planted Backdoors Targeting High Profile Networks in Central Asia BYEBY Ghost RAT Microcin MimiKatz Vicious Panda |
2020-03-12
⋅
Check Point Research
⋅
Vicious Panda: The COVID Campaign 8.t Dropper Vicious Panda |
2019-08-01
⋅
Kaspersky Labs
⋅
APT trends report Q2 2019 Vicious Panda |
2017-11-25
⋅
Kaspersky Labs
⋅
MICROCIN MALWARE: TECHNICAL DETAILS AND INDICATORS OF COMPROMISE Microcin Vicious Panda |
2017-09-28
⋅
Palo Alto Networks Unit 42
⋅
Threat Actors Target Government of Belarus Using CMSTAR Trojan BYEBY CMSTAR Vicious Panda |
2017-09-25
⋅
Kaspersky Labs
⋅
A simple example of a complex cyberattack Microcin Vicious Panda |