Ballistic Bobcat Apt

Threat Actor updated 6 months ago (2024-05-04T20:11:54.395Z)
Download STIX
Preview STIX
The Ballistic Bobcat APT group, also known by various other names including APT35, APT42, Charming Kitten, TA453, and PHOSPHORUS, is a significant threat actor in the cybersecurity landscape. This group is responsible for deploying advanced persistent threats (APTs) to compromise systems and networks, typically with malicious intent. The recent discovery of a novel backdoor deployed by this group underscores their ongoing activity and the evolving nature of their tactics, techniques, and procedures. In May 2022, security experts uncovered a new backdoor, referred to as "Sponsor," that had been deployed by the Ballistic Bobcat APT group on an Israeli victim's system. The discovery was made during an examination of an intriguing sample from the victim's system. This incident highlights the group's global reach, which extends beyond Israel to other countries such as Brazil and the United Arab Emirates. Recently, cybersecurity analysts at ESET discovered a new campaign, Sponsor Malware, being conducted by the Ballistic Bobcat APT group. Through this campaign, the threat actors are actively targeting several entities. The discovery of this campaign further emphasizes the sustained threat posed by the Ballistic Bobcat APT group. It is crucial for organizations to remain vigilant and take appropriate measures to protect their systems and data from these sophisticated cyber threats.
Description last updated: 2023-09-13T15:45:26.408Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Ballistic Bobcat Apt Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more