Names | TinyPosh | |
Category | Malware | |
Type | Backdoor, Downloader, Loader | |
Description | (Group-IB) As in the first campaigns, opening the link in the email resulted in the TinyPosh Trojan being downloaded to the victim's computer. The malware achieved persistence in the system, obtained privileges of the account from which the Trojan was launched, and could download and launch the Cobalt Strike Beacon upon command. To hide the real C&C address, the hackers used the Cloudflare Workers server. | |
Information | <https://www.group-ib.com/blog/oldgremlin> |
Last change to this tool card: 19 October 2020
Download this tool card in JSON format
Previous: TinyPOS
Next: Tinyproxy
Changed | Name | Country | Observed | ||
APT groups | |||||
OldGremlin | 2020-Feb 2021 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |