Explosive

Description

(Check Point) Explosive is implanted within its targets and then used to harvest information. Tracking down these infections was quite a difficult task due to the multiple concealment measures taken by the attackers. The attackers select only a handful of targets to avoid unnecessary exposure. New and custom versions are developed, compiled and deployed specifically for certain targets, and ”radio silence” periods are configured and embedded specifically into each targeted implant.

Names

Name
Explosive

Category

Malware

Type

  • Backdoor
  • Info stealer

Information

Mitre Attack

Other Information

Uuid

6ab0177a-c4d1-4704-a44a-f2959b8c8edf

Last Card Change

2022-12-30