Names | Heriplor | |
Category | Malware | |
Type | Backdoor | |
Description | (Symantec) Trojan.Heriplor is a backdoor that appears to be exclusively used by Dragonfly, and is one of the strongest indications that the group that targeted the western energy sector between 2011 and 2014 is the same group that is behind the more recent attacks. This custom malware is not available on the black market, and has not been observed being used by any other known attack groups. It has only ever been seen being used in attacks against targets in the energy sector. | |
Information | <https://symantec-blogs.broadcom.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks> <https://insights.sei.cmu.edu/cert/2019/03/api-hashing-tool-imagine-that.html> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.heriplor> |
Last change to this tool card: 13 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Energetic Bear, Dragonfly | 2010-Mar 2022 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |