ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > OPERA1ER

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: OPERA1ER

NamesOPERA1ER (Group-IB)
Common Raven (SWIFT)
Bluebottle (Symantec)
MotivationFinancial crime
First seen2016
Description(Group-IB) Digital forensics artifacts analyzed by Group-IB and Orange following more than 30 successful intrusions of OPERA1ER between 2018 and 2022 helped to trace down affected organizations in Ivory Coast, Mali, Burkina Faso, Benin, Cameroon, Bangladesh, Gabon, Niger, Nigeria, Paraguay, Senegal, Sierra Leone, Uganda, Togo, Argentina. Many of the victims identified were successfully attacked twice, and their infrastructure was then used to attack other organizations. According to Group-IB’s evaluation, between 2018 and 2022, OPERA1ER managed to steal at least $11 million, and the actual amount of damage could be as high as $30 million.
ObservedSectors: Financial, Telecommunications.
Countries: Argentina, Bangladesh, Benin, Burkina Faso, Cameroon, Cote d'Ivoire, Gabon, Mali, Niger, Nigeria, Paraguay, Senegal, Sierra Leone, Togo, Uganda.
Tools usedAgent Tesla, BitRAT, BlackNET RAT, Cobalt Strike, Metasploit, NetWire RC, Neutrino, Ngrok, PsExec, RDPWrap, RemcosRAT, Revealer Keylogger, VenomRAT, Living off the Land.
Operations performedMay 2022Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa
Counter operationsJul 2023Operation “Nervone”
Suspected key figure of notorious cybercrime group arrested in joint operation

Last change to this card: 05 September 2023

Download this actor card in PDF or JSON format

Previous: OnionDog
Next: Operation Armor Piercer

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]