Tomiris
Description
(Kaspersky) Tomiris focuses on intelligence gathering in Central Asia. Tomiris’s endgame consistently appears to be the regular theft of internal documents.
The threat actor targets government and diplomatic entities in the CIS. The occasional victims discovered in other regions (such as the Middle East or South-East Asia) turn out to be foreign representations of CIS countries, illustrating Tomiris’s narrow focus.
It is characterized by its tendency to develop numerous low-sophistication “burner” implants in a variety of programming languages that are repeatedly deployed against the same targets, using elementary but efficient packaging and distribution techniques. Tomiris occasionally leverages commercial or open-source RATs.
Overall, Tomiris is a very agile and determined actor, open to experimentation – for instance with delivery methods (DNS hijacking) or command and control (C2) channels (Telegram).
Kaspersky also asserts that there exists a form of deliberate cooperation between Tomiris and Turla, Waterbug, Venomous Bear.
Names
Name | Name-Giver |
---|---|
Tomiris | Kaspersky |
Country
Motivation
- Information theft and espionage
First Seen
2020
Observed Sectors
Observed Countries
Tools
- JLOGRAB
- JLORAT
- KopiLuwak
- Meterpreter
- RATel
- RocketMan
- Roopy
- Telemiris
- Tomiris
- Topinambour
- Tunnus
- Warzone RAT
Information
Other Information
Uuid
ddad8bb4-d188-46de-8c2d-2ed50ebbc59f
Last Card Change
2023-04-26