ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > Dark Pink

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Dark Pink

NamesDark Pink (Group-IB)
Country[Unknown]
MotivationInformation theft and espionage
First seen2022
Description(Group-IB) Group-IB, one of the global cybersecurity leaders, has today published its findings into Dark Pink, an ongoing advanced persistent threat (APT) campaign launched against high-profile targets in Cambodia, Indonesia, Malaysia, Philippines, Vietnam, and Bosnia and Herzegovina that we believe, with moderate confidence, was launched by a new threat actor. To date, Group-IB’s Threat Intelligence has been able to attribute seven successful attacks to this particular group from June-December 2022, with targets including military bodies, government ministries and agencies, and religious and non-profit organizations, although the list of victims could be significantly longer. Group-IB also noted one unsuccessful attack on a European state development body based in Vietnam.
ObservedSectors: Defense, Government, Non-profit organizations.
Countries: Bosnia and Herzegovina, Cambodia, Indonesia, Malaysia, Philippines, Vietnam.
Tools usedCtealer, Cucky, KamiKakaBot, PowerSploit, TelePowerBot, ZMsg.
Information<https://www.group-ib.com/media-center/press-releases/dark-pink-apt/>

Last change to this card: 15 February 2023

Download this actor card in PDF or JSON format

Previous: DarkHydrus, LazyMeerkat
Next: DarkUniverse

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]