ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool Neuron

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Neuron

NamesNeuron
CategoryMalware
TypeBackdoor
DescriptionNeuron consists of both client and server components. The Neuron client and Neuron service are written using the .NET framework with some codebase overlaps. The Neuron client is used to infect victim endpoints and extract sensitive information from local client machines. The Neuron server is used to infect network infrastructure such as mail and web servers, and acts as local Command & Control (C2) for the client component. Establishing a local C2 limits interaction with the target network and remote hosts. It also reduces the log footprint of actor infrastructure and enables client interaction to appear more convincing as the traffic is contained within the target network.
Information<https://threatpost.com/turla-compromises-iranian-apt/149375/>
<https://www.ncsc.gov.uk/alerts/turla-group-malware>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.neuron>

Last change to this tool card: 14 May 2020

Download this tool card in JSON format

All groups using tool Neuron

ChangedNameCountryObserved

APT groups

 OilRig, APT 34, Helix Kitten, ChryseneIran2014-Apr 2020X
 Turla, Waterbug, Venomous BearRussia1996-Jun 2020 

2 groups listed (2 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key