Names | Casper | |
Category | Malware | |
Type | Reconnaissance | |
Description | (ESET) Casper was used against Syrian targets in April 2014, which makes it the most recent malware from this group publicly known at this time. To attack their targets, Casper’s operators used zero-day exploits in Adobe Flash, and these exploits were – surprisingly – hosted on a Syrian governmental website. Casper is a well-developed reconnaissance tool, making extensive efforts to remain unseen on targeted machines. Of particular note are the specific strategies adopted against antimalware software. | |
Information | <https://www.welivesecurity.com/2015/03/05/casper-malware-babar-bunny-another-espionage-cartoon/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.casper> |
Last change to this tool card: 23 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Snowglobe, Animal Farm | 2011 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |