Deceptikons, DeathStalker
Description
(Kaspersky) In this blog post, we’ll be focusing on DeathStalker: a unique threat group that appears to target law firms and companies in the financial sector (although we’ve occasionally seen them in other verticals as well). As far as we can tell, this actor isn’t motivated by financial gain. They don’t deploy ransomware, steal payment information to resell it, or engage in any type of activity commonly associated with the cybercrime underworld. Their interest in gathering sensitive business information leads us to believe that DeathStalker is a group of mercenaries offering hacking-for-hire services, or acting as some sort of information broker in financial circles.
DeathStalker first came to our attention through a PowerShell-based implant called Powersing. By unraveling this thread, we were able to identify activities dating back to 2018, and possibly even 2012.
There is activity overlap with Evilnum.
Names
Name | Name-Giver |
---|---|
Deceptikons | Kaspersky |
DeathStalker | Kaspersky |
Country
Motivation
- Information theft and espionage
First Seen
2012
Observed Sectors
Observed Countries
Tools
Operations
- 2020: DeathStalker targets legal entities with new Janicab variant https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/
- 2020-05: Meet PowerPepper: the spicy implant that your bland scripts setup needed https://securelist.com/what-did-deathstalker-hide-between-two-ferns/99616/
- 2020-06: VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges https://securelist.com/vilerat-deathstalkers-continuous-strike/107075/
Information
- https://securelist.com/deathstalker-mercenary-triumvirate/98177/
- https://securelist.com/apt-trends-report-q2-2020/97937/
Other Information
Uuid
55986798-f21d-4c64-9f5b-57676bf32241
Last Card Change
2022-12-27