Names | Kikothac | |
Category | Malware | |
Type | Backdoor | |
Description | (Group-IB) During the first operations the cybercriminals used a third-party patched backdoor Kikothac without access to its source code. They chose a Trojan, which had been known since November 2015, and did not require a lot of time for reverse engineering and back end implementation. The usage of this disassembled backdoor indicates that the group started without preparation and the first operation was a mere attempt to test their capabilities. | |
Information | <https://www.group-ib.com/resources/threat-research/silence_moving-into-the-darkside.pdf> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.kikothac> |
Last change to this tool card: 23 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Silence, Contract Crew | [Unknown] | 2016-Aug 2022 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |