Куда я попал?
APT-C-23
APT-C-23 is a threat group that has been active since at least 2014.(Citation: symantec_mantis) APT-C-23 has primarily focused its operations on the Middle East, including Israeli military assets. APT-C-23 has developed mobile spyware targeting Android and iOS devices since 2017.(Citation: welivesecurity_apt-c-23)
ID: G1028
Associated Groups: Arid Viper, Grey Karkadann, Mantis, Desert Falcon, Big Bang APT, Two-tailed Scorpion
Version: 1.0
Created: 26 Mar 2024
Last Modified: 17 Nov 2024
Associated Group Descriptions |
|
Name | Description |
---|---|
Arid Viper | (Citation: welivesecurity_apt-c-23)(Citation: sentinelone_israel_hamas_war)(Citation: fb_arid_viper) |
Grey Karkadann | (Citation: sentinelone_israel_hamas_war) |
Mantis | (Citation: symantec_mantis)(Citation: sentinelone_israel_hamas_war) |
Desert Falcon | (Citation: welivesecurity_apt-c-23)(Citation: sentinelone_israel_hamas_war)(Citation: fb_arid_viper) |
Big Bang APT | (Citation: checkpoint_interactive_map_apt-c-23) |
Two-tailed Scorpion | (Citation: welivesecurity_apt-c-23) |
Software |
|||
ID | Name | References | Techniques |
---|---|---|---|
S0339 | Micropsia | (Citation: Radware Micropsia July 2018) (Citation: Talos Micropsia June 2017) | Archive via Utility, Windows Management Instrumentation, Screen Capture, System Owner/User Discovery, Keylogging, Encrypted/Encoded File, Audio Capture, Automated Collection, System Information Discovery, Shortcut Modification, File and Directory Discovery, Security Software Discovery, Windows Command Shell, Web Protocols, Ingress Tool Transfer, Hidden Files and Directories |
References
- Kayal, A. (2018, August 26). Interactive Mapping of APT-C-23. Retrieved March 4, 2024.
- Flossman, M., Scott, M. (2021, April). Technical Paper // Taking Action Against Arid Viper. Retrieved November 17, 2024.
- Hegel, T., Milenkoski, A. (2023, October 24). The Israel-Hamas War | Cyber Domain State-Sponsored Activity of Interest. Retrieved March 4, 2024.
- Symantec Threat Hunter Team. (2023, April 4). Mantis: New Tooling Used in Attacks Against Palestinian Targets. Retrieved March 4, 2024.
- Stefanko, L. (2020, September 30). APT‑C‑23 group evolves its Android spyware. Retrieved March 4, 2024.
Навигация
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.