ETDA ThaiCERT
Report
Search
Home > List all groups > WildPressure

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: WildPressure

NamesWilePressure (Kaspersky)
Country[Unknown]
MotivationInformation theft and espionage
First seen2019
Description(Kaspersky) In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum. All the victims we registered were organizations from the Middle East. At least some of them are related to industrial sector. Our Kaspersky Threat Attribution Engine (KTAE) doesn’t show any code similarities with known campaigns. Nor have we seen any target intersections. In fact, we found just three almost unique samples, all in one country. So we consider the attacks to be targeted and have currently named this operation WildPressure.
ObservedSectors: Industrial.
Countries: Middle East.
Tools usedMilum.
Information<https://securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/>

Last change to this card: 14 April 2020

Download this actor card in PDF or JSON format

Previous: Wild Neutron, Butterfly, Sphinx Moth
Next: WindShift

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key