Mycommando

Threat Actor Profile Updated 3 months ago
Download STIX
Preview STIX
MyCommando, a threat actor associated with Appin, has been investigated by journalists from Reuters for its malicious activities. A threat actor is a human entity that executes actions with harmful intent and can range from an individual to a private company or a government entity. In the case of MyCommando, it is linked to Appin, a company known for offering tools and services with potential for misuse. The investigation into MyCommando's activities was comprehensive, involving multiple sources of information including logs connected to an Appin site called "MyCommando". The investigative report by Reuters revealed detailed insights into Appin's operations and clients, providing a clear understanding of MyCommando's role within the organization. One of the core services offered by Appin was a tool named "MyCommando", also known as GoldenEye or Commando. This tool was central to Appin's offerings, enabling customers to engage in various potentially harmful activities. MyCommando allowed Appin's customers to log in to view and download campaign-specific data and status updates, communicate securely, and select from a variety of task options. These tasks ranged from open-source research to social engineering to trojan campaigns. The extent of these services underscores the potential threats posed by MyCommando and its association with Appin, highlighting the need for ongoing vigilance and cybersecurity measures to counter such threat actors.
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Goldeneye
1
GoldenEye is a recognized threat actor in the cybersecurity world, known for its malicious activities. It's often considered a variant of Petya and has been referred to as WannaCry's sibling due to similarities in their operations. GoldenEye appears to be an adaptation of another source code on GitH
Commando
1
Commando is a threat actor identified as being behind the "Commando Cat" attack campaign, which poses significant cybersecurity risks through the abuse of exposed Docker remote API servers. The Commando Cat attack sequence involves deploying benign containers generated using the publicly-available C
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Trojan
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
AppinUnspecified
2
Appin, an Indian-based threat actor or hacking group, has been linked to numerous data theft incidents and cyberattacks as per the exhaustive analysis of data collected by Reuters journalists. Notably, Appin's activities have been tied to incidents involving Telenor and a Zurich-based consultant. De
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the Mycommando Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
8 months ago
Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks
CERT-EU
8 months ago
Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years
DARKReading
8 months ago
Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks