TEMP.Veles

Threat Actor Profile Updated 3 months ago
Download STIX
Preview STIX
TEMP.Veles, a threat actor suspected of conducting malicious activities, has been linked to the Central Research Institute of Chemistry and Mechanics (CNIIHM) based in Moscow. The link is based on activity originating from an IP address registered to CNIIHM, which was used for various purposes such as network reconnaissance, monitoring open-source coverage of TRITON, and supporting malicious activities related to the TRITON intrusion. The behavior patterns observed in TEMP.Veles' activities align with the Moscow time zone, where CNIIHM is located. Furthermore, FireEye discovered malware development that likely supports TEMP.Veles' operations, indicating a strong connection between the two entities. However, this connection has been a source of confusion within the cybersecurity community. FireEye had previously identified the "TRITON actor" as a separate entity linked to a Russian research institution, and named it "TEMP.Veles." Yet, since late 2018, FireEye seems to have shifted its terminology, referring more ambiguously to the "TRITON actor." Meanwhile, Dragos consistently refers to an activity group called XENOTIME, which also appears to describe the same phenomena as TEMP.Veles and the "TRITON actor." This inconsistency in naming conventions highlights potential limitations in the methodology when adversaries use publicly available tools with limited customization. Despite the terminological ambiguity, there is a consensus that TEMP.Veles deployed the TRITON attack framework. In a 2018 public announcement, FireEye researchers indicated that CNIIHM at least supported TEMP.Veles in deploying TRITON. Subsequent presentations at Cyberwarcon and the Kaspersky Lab-sponsored Security Analyst Summit essentially consolidated the association between TRITON, the research institute, and TEMP.Veles. However, while evidence suggests CNIIHM likely possesses the necessary institutional knowledge and personnel to create TRITON and support TEMP.Veles operations, there is no specific proof that CNIIHM developed the tool.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
XENOTIME
1
XENOTIME is a threat actor group that has been active since late 2018, gaining notoriety for its malicious cyber activities. The group was initially referred to as TEMP.Veles by FireEye, but this terminology was later replaced with the more cryptic "TRITON actor". Meanwhile, cybersecurity firm Drago
Triton Actor
1
The TRITON actor is a threat actor known for its malicious activities, specifically focused on gaining access to Operational Technology (OT) networks. Identified by cybersecurity firm FireEye, the actor's tactics, techniques, and procedures (TTPs) were first publicly detailed in 2017 when they deplo
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
russian
Russia
Fireeye
Dragos
Malware
Lateral Move...
Reconnaissance
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
TRITONUnspecified
1
Triton is a sophisticated malware that has been historically used to target the energy sector. It was notably used in 2017 by the Russian Central Scientific Research Institute of Chemistry and Mechanics (TsNIIkhM) to attack a Middle East petrochemical facility. The malware, also known as Trisis and
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the TEMP.Veles Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
MITRE
a year ago
A XENOTIME to Remember: Veles in the Wild
MITRE
a year ago
TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers | Mandiant