Blackfly

Threat Actor updated 7 months ago (2024-05-04T20:34:42.014Z)
Download STIX
Preview STIX
Blackfly is a threat actor, tracked by Symantec, that has been involved in cyber-attacks primarily targeting South Korean companies, especially those in the video game and software development industry. The group initiated its activities with a campaign to steal certificates, which were later utilized to sign malware for targeted attacks. Notably, Blackfly stole a certificate from a company less than two years after another threat actor named Suckfly had stolen a certificate from the same entity. This indicates a shared modus operandi between the two groups, suggesting possible links or common origins. The activities of Blackfly have been linked with multiple Chinese threat groups, including APT 41, also known as Redfly, Winnti, Wicked Panda, or Blackfly. These connections are further complicated by the presence of other subgroups within Winnti, such as Greyfly and Redfly (aka Red Echo), creating challenges in clustering and attribution. The use of similar tools, such as the remote access Trojan (RAT) PlugX, by these groups, including Blackfly and MustangPanda, further blurs the lines of attribution. Recent power grid attacks have been associated with Redfly, which is distinct from both Blackfly and Grayfly. While Symantec does not attribute Redfly to any specific nation, previous reports have closely linked the related groups Blackfly and Greyfly to China. This complex web of associations and overlapping activities underscores the sophisticated and interconnected nature of modern cyber threats, emphasizing the need for comprehensive and nuanced cybersecurity strategies.
Description last updated: 2024-05-04T16:18:36.812Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Redfly is a possible alias for Blackfly. RedFly, a threat actor group known for its malicious activities, has emerged as a significant cybersecurity concern. The group's operations are characterized by their strategic execution and targeted focus, often resulting in substantial security breaches. Threat actors like RedFly pose a significan
3
APT41 is a possible alias for Blackfly. APT41, also known as Winnti, is a threat actor suspected to be originating from China, with its activities dating back to as early as 2012. It has targeted organizations in at least 14 countries and has been associated with the use of at least 46 different code families and tools. The group's activi
3
Winnti is a possible alias for Blackfly. Winnti is a threat actor group known for its malicious activities, primarily originating from Chinese Advanced Persistent Threat (APT) operational infrastructure. The group, which has been active since at least 2007, was first spotted by Kaspersky in 2013. It is associated with several aliases such
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Symantec
Apt
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The threatActor Greyfly is associated with Blackfly. Unspecified
2
Source Document References
Information about the Blackfly Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more