Perseus

Campaign updated a month ago (2024-10-15T09:16:08.487Z)
Download STIX
Preview STIX
The Perseus campaign was a significant cybersecurity operation aimed at combating the Snake malware, a signature tool used by the Russia-sponsored Turla advanced persistent threat (APT). This operation, dubbed "Operation Medusa," was conducted by joint intelligence agencies, including the FBI, and was primarily targeted at protecting small and medium-sized businesses. The campaign was characterized by the use of an innovative tool developed by the FBI, named PERSEUS, which was used to disable the harmful Snake malware on compromised systems. PERSEUS operated by initiating communication sessions with the Snake malware implant on a targeted computer. It then issued commands that prompted the Snake implant to deactivate itself while leaving the host computer and legitimate applications unaffected. This process involved the malware overwriting its own vital components, effectively neutralizing it. The execution of PERSEUS on machines occurred without users' active consent, facilitated by a search warrant issued by a US magistrate judge authorizing remote access. The impact of the Perseus campaign was substantial, leading to the successful disabling of the Turla's Snake malware on numerous compromised computers. This was achieved in May through the strategic use of the PERSEUS tool. By providing all-around digital protection for small and medium-sized businesses through state-of-the-art software solutions, flexible online training, and emergency response, the Perseus campaign marked a significant stride in cybersecurity efforts against advanced persistent threats.
Description last updated: 2024-10-15T09:16:08.424Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Snake Malware is a possible alias for Perseus. The Snake malware, a malicious software program known for its complexity, was identified as a key tool in the arsenal of cybercriminal group Pensive Ursa. Detailed by the Cybersecurity and Infrastructure Security Agency (CISA) in May 2023, this Python-based information stealer was used to infect com
5
Operation Medusa is a possible alias for Perseus. Operation Medusa was a concerted campaign led by the United States Department of Justice and the FBI to disrupt the activities of Turla's Snake malware. Snake, a signature malware used by the Russia-sponsored Turla advanced persistent threat (APT), had been compromising computers on a large scale. T
4
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Tool
Operation Me...
Fbi
Implant
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Turla Threat Actor is associated with Perseus. Turla, a threat actor linked to Russia, is known for its sophisticated cyber espionage operations. The group has been associated with numerous high-profile attacks, often utilizing advanced backdoors and fileless malware for infiltration and persistence. Turla's tactics, techniques, and procedures (Unspecified
4
The Medusa Threat Actor is associated with Perseus. Medusa, a threat actor group known for its malicious activities, has been increasingly involved in multiple high-profile cyber attacks. In November 2023, Medusa and other groups like LockBit and ALPHV (BlackCat) exploited a zero-day vulnerability, the Citrix Bleed (CVE-2023-4966), leading to numerouUnspecified
4
Source Document References
Information about the Perseus Campaign was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
DARKReading
a year ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago