Nomadic Octopus

Threat Actor updated 5 months ago (2024-05-04T18:30:04.499Z)
Download STIX
Preview STIX
Nomadic Octopus, a suspected Russian Advanced Persistent Threat (APT) group, has been engaged in a cyber-espionage campaign known as Paperbug since 2020. The group infiltrated a Tajikistani carrier to spy on government officials and public service infrastructures, compromising government networks, individual computers, and operational technology devices like gas station systems. Swiss cybersecurity company Prodaft's report indicates that the initial step towards compromising other victims was likely the infiltration of an unknown network, with the exact timing and method of infiltration remaining uncertain. Nomadic Octopus has been consistently spying on the carrier since November 2020, taking screenshots particularly when targeted victims were writing emails or creating new contracts for their customers. The threat actor used multiple servers as Command and Control (C2) for its backdoors and tools in the Paperbug campaign. ESET, a cybersecurity firm, has identified only one type of malware used by Nomadic Octopus and found evidence that the group has been active since at least 2015, indicating a high level of persistence. Anton Cherepanov, a senior malware researcher at ESET, confirmed that the hackers may speak Russian based on the spear-phishing emails they send out and the use of Russian malware filenames. Despite the ongoing operations of Nomadic Octopus, the cybersecurity industry continues to work diligently to understand and combat this threat. ESET detailed the threat actor’s operations at the Virus Bulletin conference earlier this month, providing valuable insights into the group's tactics, techniques, and procedures. As the threat landscape continues to evolve, understanding the modus operandi of groups like Nomadic Octopus is crucial in developing effective defense strategies and maintaining cybersecurity resilience.
Description last updated: 2023-11-28T19:13:11.618Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
DustSquad is a possible alias for Nomadic Octopus. DustSquad, also known as Nomadic Octopus, is a notable threat actor that has been implicated in several cyber-espionage campaigns. Throughout 2018, DustSquad, along with other actors like IndigoZebra and Sofacy, targeted political entities in Central Asia using the Octopus malware. This was revealed
2
Paperbug is a possible alias for Nomadic Octopus. Paperbug is a cyber-espionage campaign executed by a suspected Russian threat actor known as Nomadic Octopus, also referred to as DustSquad. The Swiss cybersecurity company Prodaft has released a report detailing the actions of this group, outlining their tactics, techniques, and procedures (TTPs).
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
russian
Malware
Phishing
Russia
Espionage
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Octopus Malware is associated with Nomadic Octopus. Octopus is a malware, a harmful program designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for Unspecified
3