PoisonIvy
Associated Software Descriptions |
|
Name | Description |
---|---|
Poison Ivy | (Citation: FireEye Poison Ivy) (Citation: Symantec Darkmoon Sept 2014) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G0066 | Elderwood |
(Citation: Symantec Elderwood Sept 2012) |
G1023 | APT5 |
(Citation: Mandiant Advanced Persistent Threats) |
G0093 | GALLIUM |
(Citation: Cybereason Soft Cell June 2019) (Citation: Microsoft GALLIUM December 2019) |
G0006 | APT1 |
(Citation: Mandiant APT1) |
G0018 | admin@338 |
(Citation: FireEye admin@338) |
G0081 | Tropic Trooper |
(Citation: Unit 42 Tropic Trooper Nov 2016) |
G0017 | DragonOK |
(Citation: Operation Quantum Entanglement) |
G0011 | PittyTiger |
(Citation: Villeneuve 2014) |
G0136 | IndigoZebra |
(Citation: Securelist APT Trends Q2 2017) |
G0001 | Axiom |
(Citation: Cisco Group 72) (Citation: Novetta-Axiom) |
G0045 | menuPass |
(Citation: PWC Cloud Hopper Technical Annex April 2017) (Citation: District Court of NY APT10 Indictment December 2018) |
G0002 | Moafee |
(Citation: Haq 2014) |
G0129 | Mustang Panda |
(Citation: Crowdstrike MUSTANG PANDA June 2018) (Citation: Recorded Future REDDELTA July 2020) |
G0021 | Molerats |
(Citation: DustySky2) (Citation: DustySky) (Citation: FireEye Operation Molerats) |
References
- Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.
- McCormack, M. (2017, September 15). Backdoor:Win32/Poisonivy.E. Retrieved December 21, 2020.
- O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved November 17, 2024.
- Anubhav, A., Kizhakkinan, D. (2017, February 22). Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government. Retrieved February 24, 2017.
- Ray, V., et al. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved December 18, 2020.
- Payet, L. (2014, September 19). Life on Mars: How attackers took advantage of hope for alien existance in new Darkmoon campaign. Retrieved September 13, 2018.
- FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved September 19, 2024.
- Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.