🇷🇺
Inception
APT Group
Information theft and espionage
5 zero-day CVEs
ETDA ✓
Also Known As
No alias recordedTarget Countries 54
Countries highlighted in red
United Arab Emirates
Afghanistan
Armenia
Austria
Azerbaijan
Belgium
Bulgaria
Brazil
Belarus
Democratic Republic of the Congo
Congo
Switzerland
China
Cyprus
Czech Republic
Germany
France
United Kingdom
Georgia
Greece
Indonesia
India
Islamic Republic of Iran
Italy
Jordan
Kenya
Kyrgyzstan
Kazakhstan
Lebanon
Lithuania
Morocco
Republic of Moldova
Malaysia
Mozambique
Oman
Panama
Pakistan
Portugal
Paraguay
Qatar
Romania
Russian Federation
Saudi Arabia
Slovenia
Suriname
Tajikistan
Turkmenistan
Turkey
Ukraine
Uganda
United States
Uzbekistan
Vietnam
South Africa
Sectors Targeted
Financial
Other Services (except Public Administration)
81
Energy
NAICS:48
48
Information
51
Commercial Banking
52211
Professional, Scientific, and Technical Services
54
Public Administration
92
National Security and International Affairs
9281
Computer Systems Design and Related Services
54151
National Security and International Affairs
928
Construction
23
Software Publishers
5112
Embassies
Cryptocurrency
Private sector
NAICS:31
31
Utilities
22
Finance and Insurance
52
Aerospace
Mining, Quarrying, and Oil and Gas Extraction
21
Oil and Gas Extraction
211
Computer Systems Design Services
541512
Telecommunications
517
Internet Publishing and Broadcasting and Web Search Portals
51913
Oil and gas
Research
Engineering
Defense
Computer Systems Design and Related Services
5415
Rail Transportation
482
Air Transportation
481
Other Information Services
519
Crypto
Space Research and Technology
927
Agriculture, Forestry, Fishing and Hunting
11
Government
Details
Origin
🇷🇺 RU
Last Updated
06 Jan 2026
Malware Families 4
METASPLOIT
netsupportmanager_rat
SparkKitty
SparkCat
MITRE ATT&CK 83
T1001 - Data Obfuscation
T1003.001 - LSASS Memory
T1005
T1012 - Query Registry
T1014 - Rootkit
T1016 - System Network Configuration Discovery
T1027 - Obfuscated Files or Information
T1027.002 - Software Packing
T1027.013
T1033 - System Owner/User Discovery
T1036 - Masquerading
T1036.004 - Masquerade Task or Service
T1036.005 - Match Legitimate Name or Location
T1041 - Exfiltration Over C2 Channel
T1049 - System Network Connections Discovery
T1053 - Scheduled Task/Job
T1053.005 - Scheduled Task
T1055 - Process Injection
T1056 - Input Capture
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.001 - PowerShell
T1059.003 - Windows Command Shell
T1059.005 - Visual Basic
T1069
T1069.002
T1070 - Indicator Removal on Host
T1070.004 - File Deletion
T1071
T1071.001 - Web Protocols
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1090 - Proxy
T1090.003
T1102 - Web Service
T1102.002 - Bidirectional Communication
T1105 - Ingress Tool Transfer
T1112 - Modify Registry
T1132.001 - Standard Encoding
T1134 - Access Token Manipulation
T1140 - Deobfuscate/Decode Files or Information
T1157 - Dylib Hijacking
T1195 - Supply Chain Compromise
T1199 - Trusted Relationship
T1203
T1204 - User Execution
T1204.002 - Malicious File
T1218 - Signed Binary Proxy Execution
T1218.005
T1218.010
T1221
T1490 - Inhibit System Recovery
T1496 - Resource Hijacking
T1518
T1518.001 - Security Software Discovery
T1526 - Cloud Service Discovery
T1543.003 - Windows Service
T1547 - Boot or Logon Autostart Execution
T1547.001 - Registry Run Keys / Startup Folder
T1552.001 - Credentials In Files
T1553.002 - Code Signing
T1553.005 - Mark-of-the-Web Bypass
T1555
T1555.003 - Credentials from Web Browsers
T1560 - Archive Collected Data
T1565.001 - Stored Data Manipulation
T1566 - Phishing
T1566.001 - Spearphishing Attachment
T1569 - System Services
T1573
T1573.001 - Symmetric Cryptography
T1574 - Hijack Execution Flow
T1584 - Compromise Infrastructure
T1584.001 - Domains
T1586 - Compromise Accounts
T1586.002 - Email Accounts
T1587 - Develop Capabilities
T1587.001 - Malware
T1588 - Obtain Capabilities
T1588.001 - Malware
T1588.002
T1589 - Gather Victim Identity Information
T1589.002 - Email Addresses