Names | Explosive | |
Category | Malware | |
Type | Backdoor, Info stealer | |
Description | (Check Point) Explosive is implanted within its targets and then used to harvest information. Tracking down these infections was quite a difficult task due to the multiple concealment measures taken by the attackers. The attackers select only a handful of targets to avoid unnecessary exposure. New and custom versions are developed, compiled and deployed specifically for certain targets, and ”radio silence” periods are configured and embedded specifically into each targeted implant. | |
Information | <https://blog.checkpoint.com/2015/03/31/volatilecedar/> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0569/> |
Last change to this tool card: 30 December 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Volatile Cedar | 2012-Early 2020 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |