Names | Deceptikons (Kaspersky) DeathStalker (Kaspersky) | |
Country | [Unknown] | |
Motivation | Information theft and espionage | |
First seen | 2012 | |
Description | (Kaspersky) In this blog post, we’ll be focusing on DeathStalker: a unique threat group that appears to target law firms and companies in the financial sector (although we’ve occasionally seen them in other verticals as well). As far as we can tell, this actor isn’t motivated by financial gain. They don’t deploy ransomware, steal payment information to resell it, or engage in any type of activity commonly associated with the cybercrime underworld. Their interest in gathering sensitive business information leads us to believe that DeathStalker is a group of mercenaries offering hacking-for-hire services, or acting as some sort of information broker in financial circles. DeathStalker first came to our attention through a PowerShell-based implant called Powersing. By unraveling this thread, we were able to identify activities dating back to 2018, and possibly even 2012. | |
Observed | Sectors: Financial and law firms. Countries: Argentina, China, Cyprus, India, Israel, Jordan, Lebanon, Russia, Switzerland, Taiwan, Turkey, UAE, UK. | |
Tools used | Evilnum, Janicab, PowerPepper, Powersing. | |
Operations performed | May 2020 | Meet PowerPepper: the spicy implant that your bland scripts setup needed <https://securelist.com/what-did-deathstalker-hide-between-two-ferns/99616/> |
Information | <https://securelist.com/deathstalker-mercenary-triumvirate/98177/> <https://securelist.com/apt-trends-report-q2-2020/97937/> |
Last change to this card: 06 January 2021
Download this actor card in PDF or JSON format
Previous: Dark Basin
Next: Doppel Spider
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |