🇷🇺

Inception

APT Group Information theft and espionage 5 zero-day CVEs ETDA ✓

Also Known As

No alias recorded

Target Countries 54

Countries highlighted in red

United Arab Emirates Afghanistan Armenia Austria Azerbaijan Belgium Bulgaria Brazil Belarus Democratic Republic of the Congo Congo Switzerland China Cyprus Czech Republic Germany France United Kingdom Georgia Greece Indonesia India Islamic Republic of Iran Italy Jordan Kenya Kyrgyzstan Kazakhstan Lebanon Lithuania Morocco Republic of Moldova Malaysia Mozambique Oman Panama Pakistan Portugal Paraguay Qatar Romania Russian Federation Saudi Arabia Slovenia Suriname Tajikistan Turkmenistan Turkey Ukraine Uganda United States Uzbekistan Vietnam South Africa

Details

Origin 🇷🇺 RU
Last Updated 06 Jan 2026

Malware Families 4

METASPLOIT
netsupportmanager_rat
SparkKitty
SparkCat

MITRE ATT&CK 83

T1001 - Data Obfuscation T1003.001 - LSASS Memory T1005 T1012 - Query Registry T1014 - Rootkit T1016 - System Network Configuration Discovery T1027 - Obfuscated Files or Information T1027.002 - Software Packing T1027.013 T1033 - System Owner/User Discovery T1036 - Masquerading T1036.004 - Masquerade Task or Service T1036.005 - Match Legitimate Name or Location T1041 - Exfiltration Over C2 Channel T1049 - System Network Connections Discovery T1053 - Scheduled Task/Job T1053.005 - Scheduled Task T1055 - Process Injection T1056 - Input Capture T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 - Windows Command Shell T1059.005 - Visual Basic T1069 T1069.002 T1070 - Indicator Removal on Host T1070.004 - File Deletion T1071 T1071.001 - Web Protocols T1082 - System Information Discovery T1083 - File and Directory Discovery T1090 - Proxy T1090.003 T1102 - Web Service T1102.002 - Bidirectional Communication T1105 - Ingress Tool Transfer T1112 - Modify Registry T1132.001 - Standard Encoding T1134 - Access Token Manipulation T1140 - Deobfuscate/Decode Files or Information T1157 - Dylib Hijacking T1195 - Supply Chain Compromise T1199 - Trusted Relationship T1203 T1204 - User Execution T1204.002 - Malicious File T1218 - Signed Binary Proxy Execution T1218.005 T1218.010 T1221 T1490 - Inhibit System Recovery T1496 - Resource Hijacking T1518 T1518.001 - Security Software Discovery T1526 - Cloud Service Discovery T1543.003 - Windows Service T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1552.001 - Credentials In Files T1553.002 - Code Signing T1553.005 - Mark-of-the-Web Bypass T1555 T1555.003 - Credentials from Web Browsers T1560 - Archive Collected Data T1565.001 - Stored Data Manipulation T1566 - Phishing T1566.001 - Spearphishing Attachment T1569 - System Services T1573 T1573.001 - Symmetric Cryptography T1574 - Hijack Execution Flow T1584 - Compromise Infrastructure T1584.001 - Domains T1586 - Compromise Accounts T1586.002 - Email Accounts T1587 - Develop Capabilities T1587.001 - Malware T1588 - Obtain Capabilities T1588.001 - Malware T1588.002 T1589 - Gather Victim Identity Information T1589.002 - Email Addresses