Milan

Malware updated 23 days ago (2024-11-29T14:51:34.305Z)
Download STIX
Preview STIX
Milan is a malicious software, or malware, that has been linked to the OilRig cyber-espionage group. The malware was updated and deployed alongside other backdoors such as Shark, DanBot, and Marlin in 2021. Milan shares similar communication schemes with other OilRig backdoors, notably using URIs with simple upload and download schemes for interaction with its command and control server. This overlaps with the Solar backdoor and the backdoors used in the Out to Sea operation, which also use "d" for download and "u" for upload in their URI schemes. In 2022, Milan became a significant target of Distributed Denial of Service (DDoS) attacks, enduring over 5,000 such attacks, the highest in Italy. This suggests that the malware had a considerable presence and was actively being used for illicit activities. A private intelligence firm based in Milan got entangled in an Italian hacking scandal around the same time, suspected of conducting hacking activities for international clients, possibly indicating a connection with the widespread deployment of the Milan malware. The Milan malware's impact extended beyond just cyber espionage. It allegedly facilitated unauthorized access to government databases, creating a serious threat to democracy. Prosecutors in Milan claimed that Equalize, a private investigation firm headed by Gallo, might have obtained data on approximately 800,000 individuals from a police investigations database through a backdoor, potentially created by Calamucci. This incident underscores the extensive damage that can be caused by sophisticated malware like Milan when utilized by malicious actors.
Description last updated: 2024-11-08T00:02:25.980Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Shark is a possible alias for Milan. Shark is a malicious software (malware) deployed by the cyber threat group known as OilRig. In 2021, OilRig updated its DanBot backdoor and began deploying multiple new backdoors including Shark, Milan, and Marlin, as reported in the T3 2021 issue of the ESET Threat Report. This malware can infiltra
2
DanBot is a possible alias for Milan. DanBot is a malicious software (malware) written in C# using .NET Framework 2.0 that provides basic remote access capabilities. It was identified as part of the arsenal used by the cyber threat group, OilRig, and has been linked to other backdoors such as Solar, Shark, Milan, and Marlin. The malware
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Bitcoin
Ransomware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Conti Malware is associated with Milan. Conti is a type of malware, specifically ransomware, which is designed to infiltrate and damage computer systems. This malicious software can enter systems through various methods such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personaUnspecified
2
Source Document References
Information about the Milan Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securelist
12 days ago
BankInfoSecurity
a month ago
BankInfoSecurity
2 months ago
DARKReading
5 months ago
InfoSecurity-magazine
8 months ago
CERT-EU
9 months ago
CERT-EU
9 months ago
CERT-EU
9 months ago
CERT-EU
9 months ago
CERT-EU
9 months ago
CERT-EU
10 months ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago