ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Ramsay

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Ramsay

NamesRamsay
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Exfiltration, Worm
Description(ESET) ESET researchers have discovered a previously unreported cyber-espionage framework that we named Ramsay and that is tailored for collection and exfiltration of sensitive documents and is capable of operating within air-apped networks.

Ramsay’s architecture provides a series of capabilities monitored via a logging mechanism intended to assist operators by supplying a feed of actionable intelligence to conduct exfiltration, control, and lateral movement actions, as well as providing overall behavioral and system statistics of each compromised system. The realization of these actions is possible due to the following capabilities:

• File collection and covert storage
• Command execution
• Spreading
Information<https://www.welivesecurity.com/2020/05/13/ramsay-cyberespionage-toolkit-airgapped-networks/>
<https://www.antiy.cn/research/notice&report/research_report/20200522.html>
<https://blog.bushidotoken.net/2020/06/deep-dive-darkhotel-apt.html>
<https://www.sentinelone.com/blog/why-on-device-detection-matters-new-ramsay-trojan-targets-air-gapped-networks/>
MITRE ATT&CK<https://attack.mitre.org/software/S0458/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.ramsay>

Last change to this tool card: 30 December 2022

Download this tool card in JSON format

All groups using tool Ramsay

ChangedNameCountryObserved

APT groups

 DarkHotelSouth Korea2007-Dec 2021 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]