ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > InvisiMole

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: InvisiMole

NamesInvisiMole (ESET)
UAC-0035 (CERT-UA)
CountryRussia Russia
MotivationInformation theft and espionage
First seen2013
Description(ESET) This is the modus operandi of the two malicious components of InvisiMole. They turn the affected computer into a video camera, letting the attackers see and hear what’s going on in the victim’s office or wherever their device may be. Uninvited, InvisiMole’s operators access the system, closely monitoring the victim’s activities and stealing the victim’s secrets.

Our telemetry indicates that the malicious actors behind this malware have been active at least since 2013, yet the cyber-espionage tool was never analyzed nor detected until discovered by ESET products on compromised computers in Ukraine and Russia.

The campaign is highly targeted – no wonder the malware has a low infection ratio, with only a few dozen computers being affected.

ESET also found that InvisiMole targeted computers already compromised by Gamaredon Group.
ObservedSectors: Defense, Government.
Countries: Russia, Ukraine and Eastern Europe.
Tools usedInvisiMole.
Operations performedLate 2019ESET researchers reveal the modus operandi of the elusive InvisiMole group, including newly discovered ties with the Gamaredon group
Mar 2022Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers

Last change to this card: 08 April 2022

Download this actor card in PDF or JSON format

Previous: Infy, Prince of Persia
Next: Iridium

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]