Název | Techniky | Zaměření | Původ | ||||
| Backdoor, Complex cyberattack platform | Cyberespionage, Surveillance |
| ||||
Angler-EK |
| Attack Method(s): Drive-by downloads | Motive(s):Underground Business |
| |||
|
|
|
| ||||
|
|
|
| ||||
| |||||||
|
| ||||||
|
|
|
| ||||
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping |
| ||||
| APT17 |
| CyberCrime | |||||
|
|
|
| ||||
|
|
|
| ||||
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping |
| ||||
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping |
| ||||
|
|
|
| ||||
| APT32 |
| ||||||
| APT33 |
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | ||||
| APT34 |
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | ||||
| APT35 |
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping | ||||
| APT37 |
| ||||||
| APT123 |
| ||||||
| Complex cyberattack platform | Cyberespionage, DDoS, Data theft, Data wiping |
| ||||
| Black Oasis |
| CyberCrime | |||||
| Backdoor | Cyberespionage, Data theft, Surveillance |
| ||||
Black Vine |
| Attack Method(s): Zero-day exploits, Watering-hole attacks, custom-developed malware (Hurix, Sakurel, Mivast) | Motive(s): Cyberespionage |
| |||
Butterfly |
| Attack Method(s): Zero-day exploits, custom-developed malware (OSX.Pintsized and Backdoor.Jiripbot) | Motive(s): Cyber espionage, Underground Business | ||||
| Backdoor | Stealing money, Surveillance |
| ||||
| Trojan | Cyberespionage, Data theft, |
| ||||
| Backdoor | Data theft |
| ||||
| Backdoor, Dropper | Cyberespionage |
| ||||
| Backdoor, Remote administration tool | Data theft |
| ||||
| Backdoor | Cyberespionage, Surveillance | |||||
| Backdoor | Cyberespionage, Surveillance |
| ||||
| Trojan, Backdoor | Cyberespionage, Data theft, Surveillance | Palestine, Egypt and Turkey | ||||
Dragonfly |
| Attack Method(s): Spam email, Watering hole attacks, and two main custom malware tools (Trojan.Karagany and Backdoor.Oldrea) | Motive(s): Cyber espionage, Spying, Sabotage | ||||
| Backdoor | Cyberespionage, Data theft, |
| ||||
EvilPost |
| CyberCrime | |||||
| Complex cyberattack platform | Cyberespionage, Data theft, Surveillance |
| ||||
| FIN 7 |
| CyberCrime | |||||
| Backdoor, Trojan, Rootkit, Bootkit | Surveillance |
| ||||
GovRAT |
| Attack Method(s): Targeted distribution (through client-side exploits) | Cyberespionage |
| |||
| Backdoor, Trojan, Rootkit | Surveillance |
| ||||
| Remote administration tool | Cyberespionage | |||||
| Backdoor | Cyberespionage, Data theft, Remote control |
| ||||
| Lazarus |
| Cyberespionage | |||||
| Backdoor | Cyberespionage |
| ||||
| Trojan, Backdoor, Remote administration tool | Cyberespionage, Data theft, Remote control |
| ||||
| Cyberespionage toolkit | Cyberespionage, Data theft, |
| ||||
Pawn Storm |
| Attack Method(s): Spearphishing, Phishing Websites, OWA Phishing, iOS apps, Exploits (including Zero-day) | Cyberespionage | ||||
Platinum Group |
| Backdoor, Complex cyberattack platform | Cyberespionage, Surveillance, Remote control |
| |||
| Complex cyberattack platform, Trojan, Rootkit | Cyberespionage, Facilitating other types of attacks, Remote control |
| ||||
| Complex cyberattack platform, Trojan, Rootkit | Cyberespionage, Data theft, Surveillance |
| ||||
| |||||||
SPIVY |
| ||||||
SVCMONDR |
| Complex cyberattack platform | Cyberespionage, Data theft, Surveillance |
| |||
| |||||||
Various cybercriminal group |
| ||||||
| Trojan, Cyberespionage toolkit, Backdoor | Cyberespionage, Data theft, | |||||
| Trojan | Data theft, |
| ||||
Waterbug |
| Attack Method(s): Zero-day exploits, targeted emails, stolen certificates, and a sophisticated watering-hole distribution network known as Venom | Cyberespionage, Spying, Intelligence Gathering |