DYMALLOY

Threat Actor updated 4 months ago (2024-05-04T17:04:32.374Z)
Download STIX
Preview STIX
DYMALLOY is a long-standing threat actor that employs a range of tactics to target industrial organizations, including spear-phishing and watering hole attacks. The group has been active since at least 2015 and has been associated with activity going back to 2011. DYMALLOY's attacks have successfully compromised multiple industrial control system (ICS) targets in Turkey, Europe, and North America between late 2015 and early 2017. In fall 2018, Dragos identified multiple new malware infections matching DYMALLOY's behavior. While the group avoids using custom toolkits or malware in its operations, which can make detection and specific attribution more difficult, its methodology overlaps with other groups like RASPITE and ALLANITE. For example, DYMALLOY uses similar techniques to embed a link to a resource in order to prompt an SMB connection and harvest Windows credentials. DYMALLOY has some links to Dragonfly, another threat actor that targeted industrial organizations from 2011 to 2014. DYMALLOY's attacks have continued into recent years, and it remains an active threat to industrial organizations today. Understanding the entirety of their adversary actions is key to detecting and attributing their activities.
Description last updated: 2023-06-13T13:50:02.725Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the DYMALLOY Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
DYMALLOY Threat Group | Dragos
MITRE
2 years ago
RASPITE | Dragos