ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool SocGholish

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: SocGholish

NamesSocGholish
FAKEUPDATES
FakeUpdate
CategoryMalware
TypeDownloader
Description(Menlo Labs) The term “Soc” in the “SocGholish” framework refers to the attack’s use of social engineering toolkits masquerading as a software update. Thus far, Menlo has observed this particular framework using several social engineering themes that impersonate browser updates (Chrome/Firefox), Flash Player updates, and more recently, Microsoft Teams updates.
Information<https://www.menlosecurity.com/blog/increase-in-attack-socgholish>
<https://blog.truesec.com/2021/05/05/are-the-notorious-cyber-criminals-evil-corp-actually-russian-spies/>
<https://isc.sans.edu/forums/diary/Fake+browser+update+pages+are+still+a+thing/25774/>
<https://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html>
<https://www.cybereason.com/blog/threat-analysis-report-socgholish-and-zloader-from-fake-updates-and-installers-to-owning-your-systems>
<https://blog.sucuri.net/2022/08/socgholish-5-years-of-massive-website-infections.html>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/js.fakeupdates>

Last change to this tool card: 29 December 2022

Download this tool card in JSON format

All groups using tool SocGholish

ChangedNameCountryObserved

APT groups

XIndrik SpiderRussia2007-Dec 2021X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]