SYMBOLCOMMON_NAMEaka. SYNONYMS
apk.chrysaor (Back to overview)

Chrysaor

aka: Pegasus, JigglyPuff

There is no description at this point.

References
2020-02-13QianxinQi Anxin Threat Intelligence Center
@techreport{center:20200213:report:146d333, author = {Qi Anxin Threat Intelligence Center}, title = {{APT Report 2019}}, date = {2020-02-13}, institution = {Qianxin}, url = {https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf}, language = {English}, urldate = {2020-02-27} } APT Report 2019
Chrysaor Exodus Dacls elf.vpnfilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020-01-28CitizenLabBill Marczak, Siena Anstis, Masashi Crete-Nishihata, John Scott-Railton, Ron Deibert
@online{marczak:20200128:stopping:cda3173, author = {Bill Marczak and Siena Anstis and Masashi Crete-Nishihata and John Scott-Railton and Ron Deibert}, title = {{Stopping the Press: New York Times Journalist Targeted by Saudi-linked Pegasus Spyware Operator}}, date = {2020-01-28}, organization = {CitizenLab}, url = {https://citizenlab.ca/2020/01/stopping-the-press-new-york-times-journalist-targeted-by-saudi-linked-pegasus-spyware-operator/}, language = {English}, urldate = {2020-01-28} } Stopping the Press: New York Times Journalist Targeted by Saudi-linked Pegasus Spyware Operator
Chrysaor
2018-09-18The CitizenlabBill Marczak, John Scott-Railton, Sarah McKune, Bahr Abdul Razzak, Ron Deibert
@online{marczak:20180918:hide:2c8e5f5, author = {Bill Marczak and John Scott-Railton and Sarah McKune and Bahr Abdul Razzak and Ron Deibert}, title = {{Hide and Seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries}}, date = {2018-09-18}, organization = {The Citizenlab}, url = {https://citizenlab.ca/2018/09/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-countries/}, language = {English}, urldate = {2019-11-21} } Hide and Seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries
Chrysaor
2017-04-03GoogleRich Cannings, Jason Woloz, Neel Mehta, Ken Bodzak, Wentao Chang, Megan Ruthven
@online{cannings:20170403:investigation:7deb188, author = {Rich Cannings and Jason Woloz and Neel Mehta and Ken Bodzak and Wentao Chang and Megan Ruthven}, title = {{An investigation of Chrysaor Malware on Android}}, date = {2017-04-03}, organization = {Google}, url = {https://android-developers.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html}, language = {English}, urldate = {2019-12-17} } An investigation of Chrysaor Malware on Android
Chrysaor
2017-04-03GoogleRich Cannings, Jason Woloz, Neel Mehta, Ken Bodzak, Wentao Chang, Megan Ruthven
@online{cannings:20170403:investigation:8de942a, author = {Rich Cannings and Jason Woloz and Neel Mehta and Ken Bodzak and Wentao Chang and Megan Ruthven}, title = {{An Investigation of Chrysaor Malware on Android}}, date = {2017-04-03}, organization = {Google}, url = {https://security.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html}, language = {English}, urldate = {2020-01-08} } An Investigation of Chrysaor Malware on Android
Chrysaor
2017-04LookoutLookout
@techreport{lookout:201704:pegasus:b9392ab, author = {Lookout}, title = {{Pegasus for Android: Technical Analysis and Findings of Chrysaor}}, date = {2017-04}, institution = {Lookout}, url = {https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-android-technical-analysis.pdf}, language = {English}, urldate = {2020-01-07} } Pegasus for Android: Technical Analysis and Findings of Chrysaor
Chrysaor
2016-12-27CCCMax Bazally
@online{bazally:20161227:pegasus:9fd5170, author = {Max Bazally}, title = {{Pegasus internals: Technical Teardown of the Pegasus malware and Trident exploit chain}}, date = {2016-12-27}, organization = {CCC}, url = {https://media.ccc.de/v/33c3-7901-pegasus_internals}, language = {English}, urldate = {2020-01-08} } Pegasus internals: Technical Teardown of the Pegasus malware and Trident exploit chain
Chrysaor

There is no Yara-Signature yet.