Ishak

Threat Actor Profile Updated 24 days ago
Download STIX
Preview STIX
Ishak is a threat actor that has been used in cyberattacks attributed to the group known as Rocket Kitten. This relationship became apparent around Fall 2015 when Rocket Kitten was the subject of multiple publications, and a shift in behavior was observed. The preference for Ishak scripts over another tool, Oyun, may be due to this behavioral change. Two distinct personalities within Rocket Kitten were identified: one using tools tied to an individual named Yaser Balaghi (including Gholee, Woolger, MPK, Oyun), and the other connected to Flying Kitten tools, including Ishak. Notably, there were some additions to the Ishak codebase related to logging and authentication that were not previously seen in the Flying Kitten kit. Both the Flying Kitten and Ishak toolkits are relatively simple, with victim identifiers stored in an array in a file that functions essentially as a phone book for the platform. These changes seem to have been made in response to a report by ClearSky, a cybersecurity firm. The information about Ishak was published by the ISEAS – Yusof Ishak Institute, which conducts research on various topics including cybersecurity. Despite the threats posed by entities like Ishak, the institute points out that many countries are opting to incorporate AI-related elements into existing legislation to address inherent risks and implement safeguards efficiently. However, it is yet to be seen whether these guidelines will translate into impactful domestic policies, especially in ASEAN member states where four nations - Brunei, Cambodia, Laos, and Myanmar - have not yet developed their own AI strategies.
What's your take? (Question 1 of 0)
dc2b5c67-9f66-43d0-ba85-1275eb896bb0 Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Facebook
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the Ishak Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
MITRE
a year ago
Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code
CERT-EU
6 months ago
AI in Southeast Asia: As rules are drafted, workers share their worries and wishes
CERT-EU
5 months ago
China’s Digital Silk Road (DSR) In Southeast Asia: Progress And Challenges – Analysis
CERT-EU
9 months ago
Commentary: Cybertrooper activity in state elections marks irreversible trend in Malaysia politics
CERT-EU
a year ago
What Drives Vietnam’s Tightened Public Sphere? – Analysis
CERT-EU
a year ago
Manila’s New Geopolitical Push And Malaysia Must Step Up – Analysis
CERT-EU
6 months ago
Commentary: Fighting cybercrime to win China’s favour has become a common goal in Myanmar’s civil war
CERT-EU
10 months ago
Vietnam Orders Social Media Firms to Cut ‘Toxic’ Content Using AI
CERT-EU
a year ago
Expats falling victim to IMO hacking scams | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
a year ago
Vietnam Calls for Tech Giants to Use AI to Remove ‘Anti-State’ Content