Names | Urpage (Trend Micro) | |
Country | [Middle East] | |
Sponsor | State-sponsored | |
Motivation | Information theft and espionage | |
First seen | 2018 | |
Description | (Trend Micro) In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes. In this case we dig deeper into the possible connection between cyberattacks by focusing on the similarities an unnamed threat actor shares with Patchwork, Dropping Elephant, and another threat actor called Bahamut. For the sake of this report, we will call this unnamed threat actor “Urpage.” | |
Observed | Countries: Pakistan. | |
Tools used | Trojaned Android applications. | |
Information | <https://blog.trendmicro.com/trendlabs-security-intelligence/the-urpage-connection-to-bahamut-confucius-and-patchwork/> |
Last change to this card: 15 April 2020
Download this actor card in PDF or JSON format
Previous: Unfading Sea Haze
Next: Velvet Ant
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |