Names | HyperStack GoldenSky SilentMoon | |
Category | Malware | |
Type | Backdoor | |
Description | (Accenture) HyperStack, first observed in 2018, is one of several RPC backdoors Turla uses. A sample identified in September 2020 has updated functionality which appears to be inspired the RPC backdoors previously publicly disclosed by ESET and Symantec Researchers as well as with the Carbon backdoor. Based on these similarities, we assess with high confidence that HyperStack is a custom Turla backdoor. | |
Information | <https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity> <https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.turla_silentmoon> |
Last change to this tool card: 24 April 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Turla, Waterbug, Venomous Bear | ![]() | 1996-Apr 2022 ![]() |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1227 | |
![]() |
[email protected] |