ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Promethium, StrongPity

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Promethium, StrongPity

NamesPromethium (Microsoft)
StrongPity (Kaspersky)
APT-C-41 (Qihoo 360)
CountryTurkey Turkey
MotivationInformation theft and espionage
First seen2012
DescriptionPromethium is an activity group that has been active since at least 2012. The group conducted a campaign in May 2016 and has heavily targeted Turkish victims. Promethium has demonstrated similarity to another activity group called Neodymium due to overlapping victim and campaign characteristics.

(Microsoft) Promethium is an activity group that has been active as early as 2012. The group primarily uses Truvasys, a first-stage malware that has been in circulation for several years. Truvasys has been involved in several attack campaigns, where it has masqueraded as one of server common computer utilities, including WinUtils, TrueCrypt, WinRAR, or SanDisk. In each of the campaigns, Truvasys malware evolved with additional features—this shows a close relationship between the activity groups behind the campaigns and the developers of the malware.
ObservedCountries: Algeria, Belgium, Canada, Colombia, Cote d'Ivoire, Egypt, France, Germany, India, Iraq, Italy, Morocco, Netherlands, Poland, Senegal, South Africa, Syria, Tunisia, Turkey, USA, Vietnam.
Tools usedStrongPity, StrongPity2, StrongPity3, Truvasys.
Operations performedMar 2018Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
Mar 2018Two months after the Citizen Lab report, Cylance found new Promethium/StrongPity activity, utilizing new infrastructure. The observed domains all appeared to have been registered about two weeks after Citizen Lab’s report. The malware has continued to adapt as new information is published. Minimal effort and code changes were all that was required to stay out of the limelight. Cylance observed new domains, new IP addresses, filename changes, and small code obfuscation changes.
Jul 2019In early July 2019 Alien Labs began identifying new samples resembling StrongPity. The new malware samples have been unreported and generally appear to have been created and deployed to targets following a toolset rebuild in response to the above public reporting during the fourth quarter of 2018.
2019PROMETHIUM extends global reach with StrongPity3 APT
Feb 2020We recently detected a new, ongoing data exfiltration campaign targeting victims in Turkey that started in February 2020.
Jul 2021StrongPity APT Group Deploys Android Malware for the First Time
Nov 2021A new StrongPity variant hides behind Notepad++ installation
Nov 2021StrongPity espionage campaign targeting Android users

Last change to this card: 15 February 2023

Download this actor card in PDF or JSON format

Previous: PowerPool
Next: Pusikurac

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]