Names | Termite | |
Category | Tools | |
Type | Backdoor, Tunneling, Exfiltration, Downloader | |
Description | Termite can act as a SOCKS proxy to bounce traffic, as well as a lightweight backdoor that can upload and download files, and execute shell commands, and is available for a range of different operating systems and architectures including x86 ARM, PowerPC, Motorola, SPARC and Renesas. | |
Information | <http://rootkiter.com/Termite/> <https://threatrecon.nshc.net/2019/03/19/sectorm04-targeting-singapore-custom-malware-analysis/> <https://www.alienvault.com/blogs/labs-research/internet-of-termites> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.termite> |
Last change to this tool card: 14 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Whitefly, Mofang | [Unknown] | 2012-Jul 2018 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |