Names | HyperStack GoldenSky SilentMoon Turla SilentMoon BigBoss Cacao | |
Category | Malware | |
Type | Backdoor | |
Description | (Accenture) HyperStack, first observed in 2018, is one of several RPC backdoors Turla uses. A sample identified in September 2020 has updated functionality which appears to be inspired the RPC backdoors previously publicly disclosed by ESET and Symantec Researchers as well as with the Carbon backdoor. Based on these similarities, we assess with high confidence that HyperStack is a custom Turla backdoor. | |
Information | <https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity> <https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0537/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.turla_silentmoon> |
Last change to this tool card: 30 December 2022
Download this tool card in JSON format
Previous: HYPERSCRAPE
Next: IAP
Changed | Name | Country | Observed | ||
APT groups | |||||
Turla, Waterbug, Venomous Bear | 1996-Dec 2023 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |