Names | BarbWire | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Info stealer, Credential stealer, Keylogger, Downloader, Exfiltration | |
Description | (Cybereason) The backdoor component of APT-C-23’s operation is a very capable piece of malware, and it is obvious that a lot of effort was put into hiding its capabilities using a custom base64 algorithm. Its main goal is to fully compromise the victim machine, gaining access to their most sensitive data. The backdoor’s main capabilities include: • Persistence • OS Reconnaissance • Data encryption • Keylogging • Screen capturing • Audio recording • Download additional malware • Local/external drives and directory enumeration • Steal specific file types and exfiltrate data | |
Information | <https://www.cybereason.com/blog/operation-bearded-barbie-apt-c-23-campaign-targeting-israeli-officials> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.barbwire> |
Last change to this tool card: 27 December 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Desert Falcons | [Gaza] | 2011-Oct 2023 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |