Sysjoker

Malware Profile Updated 23 days ago
Download STIX
Preview STIX
SysJoker is a sophisticated piece of malware, short for malicious software, which has been designed with the intent to exploit and damage computer systems. It infiltrates systems without the user's knowledge through suspicious downloads, emails, or websites. Once it has gained access, SysJoker can disrupt operations, steal personal information, or even hold data hostage for ransom. The malware has been linked to an Advanced Persistent Threat (APT) group associated with Hamas. This APT group has reportedly used the Rust-based SysJoker backdoor to launch cyberattacks against Israel. The use of Rust, a system programming language designed for performance and safety, particularly safe concurrency, highlights the sophistication and potential danger of this malware. According to the information available from securityaffairs.com, there have been multiple instances of these attacks. Given the persistent nature of the threat and its potential impact on cybersecurity infrastructure, it's crucial for organizations, especially those in Israel, to take preventive measures. These could include maintaining up-to-date antivirus software, educating users about the dangers of suspicious downloads and emails, and implementing robust data backup procedures.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Backdoor
Windows
Apt
Encryption
Rust
Operation El...
Macos
Linux
Hamas
Rat
Sandbox
Implant
Payload
Trojan
Lateral_move...
Infiltration
Cyberscoop
Israel
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Gaza Cyberganghas used
4
The Gaza Cybergang, a threat actor suspected to be affiliated with the Palestinian militant group Hamas, has been involved in various cyber espionage campaigns targeting both Palestinian and Israeli entities since 2012. The group is known for its use of sophisticated malware, including variants of S
Operation Electric PowderUnspecified
3
Operation Electric Powder is a threat actor operation that was actively involved in targeted attacks against Israeli organizations between 2016-2017. This operation, as previously reported by ClearSky, has been linked to the threat actor known as Gaza Cybergang, also referred to as Molerats. The cyb
MoleratsUnspecified
2
Molerats, also known as Gaza Cybergang Group1, is a threat actor linked to Hamas that has been active for over a decade. This low-budget group has been tracked by researchers under various names including Molerats, Gaza Cybergang, Frankenstein, WIRTE, and Proofpoint’s TA402 designation. Among 16 Adv
WildcardUnspecified
1
ThreatActor Wildcard is a sophisticated entity known for its malicious activities, including phishing, malware distribution, and other cyber threats. The group employs innovative tactics such as using the /mo parameter to specify the last day of the month and the /m parameter with the wildcard chara
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the Sysjoker Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
Securityaffairs
a day ago
Security Affairs Malware Newsletter - Round 3
Securityaffairs
2 days ago
Security Affairs Malware Newsletter - Round 3
Securityaffairs
8 days ago
Security Affairs Malware Newsletter - Round 2
Securityaffairs
16 days ago
Security Affairs Malware Newsletter - Round 1
Securityaffairs
23 days ago
Security Affairs newsletter Round 478 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
a month ago
Security Affairs newsletter Round 477 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
a month ago
Security Affairs newsletter Round 476 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
2 months ago
Security Affairs newsletter Round 473 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
3 months ago
Security Affairs newsletter Round 470 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
3 months ago
Security Affairs newsletter Round 469 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
3 months ago
Security Affairs newsletter Round 467 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
3 months ago
Security Affairs newsletter Round 466 by Pierluigi Paganini
Securityaffairs
4 months ago
Security Affairs newsletter Round 465 by Pierluigi Paganini
Securityaffairs
4 months ago
Security Affairs newsletter Round 464 by Pierluigi Paganini
Securityaffairs
4 months ago
Security Affairs newsletter Round 463 by Pierluigi Paganini
CERT-EU
4 months ago
Hackers Claim Accessing 740GB of Data from Viber Messaging App | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Securityaffairs
4 months ago
Security Affairs newsletter Round 462 by Pierluigi Paganini
Securityaffairs
5 months ago
Security Affairs newsletter Round 461 by Pierluigi Paganini
Securityaffairs
5 months ago
Security Affairs newsletter Round 460 by Pierluigi Paganini
Securityaffairs
5 months ago
Security Affairs newsletter Round 459 by Pierluigi Paganini