Names | Ramsay | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Info stealer, Exfiltration, Worm | |
Description | (ESET) ESET researchers have discovered a previously unreported cyber-espionage framework that we named Ramsay and that is tailored for collection and exfiltration of sensitive documents and is capable of operating within air-apped networks. Ramsay’s architecture provides a series of capabilities monitored via a logging mechanism intended to assist operators by supplying a feed of actionable intelligence to conduct exfiltration, control, and lateral movement actions, as well as providing overall behavioral and system statistics of each compromised system. The realization of these actions is possible due to the following capabilities: • File collection and covert storage • Command execution • Spreading | |
Information | <https://www.welivesecurity.com/2020/05/13/ramsay-cyberespionage-toolkit-airgapped-networks/> |
Last change to this tool card: 15 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
![]() | DarkHotel | ![]() | 2007-May 2020 |
1 group listed (1 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |