Decoy Dog

Malware Profile Updated 2 months ago
Download STIX
Preview STIX
Decoy Dog is a notorious malware that utilizes DNS tunneling for Command and Control (C2) operations, similar to well-known campaigns like DarkHydrus, OilRig, xHunt, and SUNBURST. This malware uses the underlying tunneling tool Pupy, which applies the character '9' as padding when encoding data. First detected in late March or early April 2022, Decoy Dog has since evolved continuously to impede detection and analysis both in network traffic and file systems. The malware's unique signature indicates not just the open-source Pupy RAT but also the Decoy Dog toolkit used for deployment. The malware has exploited the often overlooked DNS oversight in networks, leading to serious cybersecurity threats. Infoblox, an industry-leading DNS Detection and Response solution provider, reported the Decoy Dog campaign in April 2023. Their president and CEO, Scott Harrell, emphasized the importance of DNS as the first line of defense against threats like Decoy Dog. However, the lack of insight into victim systems and vulnerabilities being exploited makes Decoy Dog an ongoing and severe threat, according to Dr. Renée Burton, Head of Threat Intelligence at Infoblox. Since its initial discovery, Decoy Dog has targeted various organizations, causing significant damage. At least 20 organizations in Russia, including power companies, IT firms, and government agencies, have fallen victim to this modified version of Pupy RAT. Investigations into the Decoy Dog and Pupy RAT are ongoing, highlighting the persistent threat posed by this malware. As such, it is crucial for organizations to maintain vigilance and employ robust defenses against these evolving cyber threats.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Pupy
1
Pupy is a cross-platform, multi-function Remote Access Trojan (RAT) and post-exploitation tool primarily developed in Python. It has the capability to operate on several platforms including Windows, Linux, and mobile devices, although its support for Android and OSX is limited and it has not been th
DarkHydrus
1
DarkHydrus is a notable threat actor known for executing malicious activities. The group has been associated with several well-known campaigns including DarkHydrus, OilRig, xHunt, SUNBURST, and Decoy Dog. These campaigns have leveraged DNS tunneling for Command and Control (C2) communications, a tec
OilRig
1
OilRig is a well-known threat actor in the cybersecurity landscape, notorious for its sophisticated attacks on various targets, including Middle Eastern telecommunications organizations and Israel's critical infrastructure sector. This entity has been linked to several high-profile campaigns such as
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
DNS
Rat
Decoy
Malware
Trojan
Infoblox
Exploit
Cybercrime
Pupy
xHunt
Linux
Domains
Tool
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
SUNBURSTUnspecified
1
Sunburst is a sophisticated malware that has been linked to the Kazuar code, indicating its complexity. It was used in several well-known cyber attack campaigns such as SUNBURST, OilRig, xHunt, DarkHydrus, and Decoy Dog, which employed DNS tunneling techniques for command and control (C2) communicat
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
MantisUnspecified
1
Mantis is a recognized threat actor, known for its sophisticated cyber operations. This group has been linked to several high-profile attacks and campaigns, including one that was tracked by Recorded Future as TAG-63, also known as APT-C-23. Mantis has shown connections to other notable threat group
Roaming MantisUnspecified
1
Roaming Mantis, also known as Shaoye, is a financially motivated threat actor first reported in 2017. The group primarily targets mobile device users across several countries, with a particular focus on the Asian region, including Japan, South Korea, and Taiwan. This long-term cyberattack campaign u
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
CVE-2013-3900Unspecified
1
None
Source Document References
Information about the Decoy Dog Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
Securityaffairs
2 months ago
Security Affairs newsletter Round 475 by Pierluigi Paganini – INTERNATIONAL EDITION
Unit42
2 months ago
Leveraging DNS Tunneling for Tracking and Scanning
CERT-EU
6 months ago
Cloud Atlas Phishing Attacks: Russian Companies Beware
Unit42
9 months ago
Understanding DNS Tunneling Traffic in the Wild
Malwarebytes
a year ago
Decoy dog toolkit plays the long game with Pupy RAT
CERT-EU
a year ago
Decoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networks
CERT-EU
a year ago
New Decoy Dog Malware Toolkit Targets Enterprise Networks
CERT-EU
a year ago
Decoy Dog Malware Upgraded to Include New Features
CERT-EU
a year ago
Cyber Security Today, April 26, 2023 – New reports on ransomware and cyber attacks | IT World Canada News
CERT-EU
a year ago
Cyber Security Today, Week in Review for the week ending Friday, July 28, 2023 | IT World Canada News
CERT-EU
a year ago
RSAC 2023 | Cybersecurity research on edge computing generates big interest - Cybersecurity Insiders
DARKReading
a year ago
Infoblox Uncovers DNS Malware Toolkit & Urges Companies to Block Malicious Domains
DARKReading
a year ago
Decoy Dog Gets an Upgrade With New Persistence Features
CERT-EU
a year ago
Infoblox Uncovers DNS Malware Toolkit & Urges Companies to Block Malicious Domains
DARKReading
a year ago
Infoblox Blows Whistle On ‘Decoy Dog,’ Advocates For Better DNS Monitoring
CERT-EU
a year ago
New P2Pinfect malware campaign against Redis servers detailed
CERT-EU
a year ago
Decoy Dog Malware Tool Kit Spotted Via Malicious DNS Queries | IT Security News
CERT-EU
a year ago
New AI phishing tool FraudGPT tied to same group behind WormGPT
CERT-EU
a year ago
Decoy Dog is No Ordinary Pupy - Infoblox Reveals Shift in Malware Tactics After Initial Discovery
Securityaffairs
a year ago
Experts spotted a sophisticated malware toolkit called Decoy Dog