Home > List all groups > TEMP.Veles

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: TEMP.Veles

NamesTEMP.Veles (FireEye)
Xenotime (Dragos)
ATK 91 (Thales)
CountryRussia Russia
SponsorState-sponsored, Central Scientific Research Institute of Chemistry and Mechanics
MotivationSabotage and destruction
First seen2014
DescriptionTEMP.Veles is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing TRITON, a malware framework designed to manipulate industrial safety systems.
ObservedSectors: Critical infrastructure, Energy, Manufacturing, Oil and gas.
Countries: Saudi Arabia, USA and others.
Tools usedCryptcat, Mimikatz, NetExec, PsExec, SecHack, Triton, Wii.
Operations performed2014TRISIS malware
2017TRITON malware
Feb 2019The most dangerous threat to ICS has new targets in its sights. Dragos identified the Xenotime activity group expanded its targeting beyond oil and gas to the electric utility sector. This expansion to a new vertical illustrates a trend that will likely continue for other ICS-targeting adversaries.

Last change to this card: 22 April 2020

Download this actor card in PDF or JSON format

Previous: Tempting Cedar Spyware
Next: Terbium

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
PGP Download PGP key