ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Hupigon

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Hupigon

NamesHupigon
Hupigon RAT
BKDR_HUPIGON
MFC Huner
CategoryMalware
Type0-day, Backdoor, Rootkit, Keylogger, Credential stealer, Info stealer
Description(F-Secure) Hupigon variants have several different types of features. The following list is an example of some:

• It allows others to access the computer
• Allows for recording with the user's webcam
• Can make the user's computer to attack various servers
• Send victim's computer messages
• Has rootkit functionality so it has a stealth component that hides files
• Create logs from keystrokes, steals passwords, and sends this information to remote servers
Information<https://www.f-secure.com/v-descs/backdoor_w32_hupigon.shtml>
<https://www.fireeye.com/blog/threat-research/2010/11/ie-0-day-hupigon-joins-the-party.html>
<https://www.proofpoint.com/us/threat-insight/post/threat-actors-repurpose-hupigon-adult-dating-attacks-targeting-us-universities>
<https://en.wikipedia.org/wiki/Hupigon>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.hupigon>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

All groups using tool Hupigon

ChangedNameCountryObserved

APT groups

 APT 3, Gothic Panda, BuckeyeChina2007-Nov 2017X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]