Names | Pyark | |
Category | Malware | |
Type | Backdoor, Info stealer, Exfiltration | |
Description | (Qihoo 360) The APT-C-43 organization is good at launching attacks using phishing emails, and deploys the backdoor program Pyark (Machete) written in python after invading the victim’s machine. The network communication mainly relies on FTP and HTTP protocols. After successfully infiltrating the target machine, APT-C-43 organization monitors the target users, steal sensitive data, etc. | |
Information | <https://blog.360totalsecurity.com/en/apt-c-43-steals-venezuelan-military-secrets-to-provide-intelligence-support-for-the-reactionaries-hpreact-campaign/> |
Last change to this tool card: 19 October 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
![]() | El Machete | [Unknown] | 2010-Jun 2020 |
1 group listed (1 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |