Název | Techniky | Zaměření | Původ | ||||
| Backdoor, Complex cyberattack platform | Cyberespionage, Surveillance | |||||
Angler-EK |
| Attack Method(s): Drive-by downloads | Motive(s):Underground Business | ||||
|
|
| |||||
|
|
| |||||
| |||||||
| |||||||
|
|
| |||||
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | |||||
APT17 |
| CyberCrime | |||||
|
|
| |||||
|
|
| |||||
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | |||||
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | |||||
|
|
| |||||
APT32 |
| ||||||
APT33 |
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | ||||
APT34 |
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | ||||
APT35 |
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | ||||
APT37 |
| ||||||
APT123 |
| ||||||
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | |||||
Black Oasis |
| CyberCrime | |||||
| Backdoor | Cyberespionage, Data theft, Surveillance | |||||
Black Vine |
| Attack Method(s): Zero-day exploits, Watering-hole attacks, custom-developed malware (Hurix, Sakurel, Mivast) | Motive(s): Cyberespionage | ||||
Butterfly |
| Attack Method(s): Zero-day exploits, custom-developed malware (OSX.Pintsized and Backdoor.Jiripbot) | Motive(s): Cyber espionage, Underground Business | ||||
| Backdoor | Stealing money, Surveillance | |||||
| Trojan | Cyberespionage, Data theft, | |||||
| Backdoor | Data theft | |||||
| Backdoor, Dropper | Cyberespionage | |||||
| Backdoor, Remote administration tool | Data theft | |||||
| Backdoor | Cyberespionage, Surveillance | |||||
| Backdoor | Cyberespionage, Surveillance | |||||
| Trojan, Backdoor | Cyberespionage, Data theft, Surveillance | Palestine, Egypt and Turkey | ||||
Dragonfly |
| Attack Method(s): Spam email, Watering hole attacks, and two main custom malware tools (Trojan.Karagany and Backdoor.Oldrea) | Motive(s): Cyber espionage, Spying, Sabotage | ||||
| Backdoor | Cyberespionage, Data theft, | |||||
EvilPost |
| CyberCrime | |||||
| Complex cyberattack platform | Cyberespionage, Data theft, Surveillance | |||||
FIN 7 |
| CyberCrime | |||||
| Backdoor, Trojan, Rootkit, Bootkit | Surveillance | |||||
GovRAT |
| Attack Method(s): Targeted distribution (through client-side exploits) | Cyberespionage | ||||
| Backdoor, Trojan, Rootkit | Surveillance | |||||
| Remote administration tool | Cyberespionage | |||||
| Backdoor | Cyberespionage, Data theft, Remote control | |||||
Lazarus |
| Cyberespionage | |||||
| Backdoor | Cyberespionage | |||||
| Trojan, Backdoor, Remote administration tool | Cyberespionage, Data theft, Remote control | |||||
| Cyberespionage toolkit | Cyberespionage, Data theft, | |||||
Pawn Storm |
| Attack Method(s): Spearphishing, Phishing Websites, OWA Phishing, iOS apps, Exploits (including Zero-day) | Cyberespionage | ||||
Platinum Group |
| Backdoor, Complex cyberattack platform | Cyberespionage, Surveillance, Remote control | ||||
| Complex cyberattack platform, Trojan, Rootkit | Cyberespionage, Facilitating other types of attacks, Remote control | |||||
| Complex cyberattack platform, Trojan, Rootkit | Cyberespionage, Data theft, Surveillance | |||||
| |||||||
SPIVY |
| ||||||
SVCMONDR |
| Complex cyberattack platform | Cyberespionage, Data theft, Surveillance | ||||
| |||||||
Various cybercriminal group |
| ||||||
| Trojan, Cyberespionage toolkit, Backdoor | Cyberespionage, Data theft, | |||||
| Trojan | Data theft, | |||||
Waterbug |
| Attack Method(s): Zero-day exploits, targeted emails, stolen certificates, and a sophisticated watering-hole distribution network known as Venom | Cyberespionage, Spying, Intelligence Gathering |