ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Ebury

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Ebury

NamesEbury
CategoryMalware
TypeBackdoor, Credential stealer, Botnet
Description(ESET) An OpenSSH backdoor used to keep control of the servers and steal credentials.
Information<https://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf>
<https://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/>
<https://www.welivesecurity.com/wp-content/uploads/2018/12/ESET-The_Dark_Side_of_the_ForSSHe.pdf>
<https://www.welivesecurity.com/2017/10/30/windigo-ebury-update-2/>
<https://web-assets.esetstatic.com/wls/en/papers/white-papers/ebury-is-alive-but-unseen.pdf>
MITRE ATT&CK<https://attack.mitre.org/software/S0377/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/elf.ebury>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:Ebury>

Last change to this tool card: 18 June 2024

Download this tool card in JSON format

All groups using tool Ebury

ChangedNameCountryObserved

Other groups

 Operation WindigoRussia2011-Mar 2017X

1 group listed (0 APT, 1 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]