Names | HYPERSCRAPE | |
Category | Malware | |
Type | Exfiltration | |
Description | (Google) HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired. It spoofs the user agent to look like an outdated browser, which enables the basic HTML view in Gmail. Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread. After the program has finished downloading the inbox, it reverts the language back to its original settings and deletes any security emails from Google. Earlier versions contained the option to request data from Google Takeout, a feature which allows users to export their data to a downloadable archive file. | |
Information | <https://blog.google/threat-analysis-group/new-iranian-apt-data-extraction-tool/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.hyperscrape> |
Last change to this tool card: 27 December 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Magic Hound, APT 35, Cobalt Illusion, Charming Kitten | 2012-Aug 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |