ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Anchor

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Anchor

NamesAnchor
CategoryMalware
TypeBackdoor
Description(Cybereason) During our investigation, we found several unidentified malware samples related to TrickBot infections. The malware is dubbed Anchor by its authors and has been active since August 2018. Unlike Anchor_DNS, the Anchor malware does not implement communication over DNS. However, it does share many behavioral, code, and string similarities with Anchor_DNS and some similarities to TrickBot.
Information<https://www.cybereason.com/blog/dropping-anchor-from-a-trickbot-infection-to-the-discovery-of-the-anchor-malware>
<https://www.bleepingcomputer.com/news/security/trickbots-new-linux-malware-covertly-infects-windows-devices/>
<https://thedfirreport.com/2021/03/08/bazar-drops-the-anchor>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.anchor>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

All groups using tool Anchor

ChangedNameCountryObserved

APT groups

 FIN6, Skeleton Spider[Unknown]2015-Oct 2021X
 Wizard Spider, Gold BlackburnRussia2014-Jun 2022X

2 groups listed (2 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]