Names Agrius (SentinelLabs)
DEV-0227 (Microsoft)
BlackShadow (Kaspersky)
SharpBoys (?)
AMERICIUM (Microsoft)
Pink Sandstorm (Microsoft)
Agonizing Serpens (Palo Alto)
Country Iran Iran
Motivation Information theft and espionage, Sabotage and destruction
First seen 2020
Description (SentinelLabs) A new threat actor SentinelLabs track as Agrius was observed operating in Israel beginning in 2020. An analysis of what at first sight appeared to be a ransomware attack revealed new variants of wipers that were deployed in a set of destructive attacks against Israeli targets. The operators behind the attacks intentionally masked their activity as ransomware attacks.
Observed Countries: Hong Kong, Israel, South Africa.
Tools used Apostle, ASPXSpy, BFG Agonizer Wiper, DEADWOOD, Fantasy, IPsec Helper, Moneybird, MultiLayer Wiper, PartialWasher Wiper, Sqlextractor.
Operations performed Feb 2022 Fantasy – a new Agrius wiper deployed through a supply‑chain attack
May 2023 Agrius Deploys Moneybird in Targeted Attacks Against Israeli Organizations
Information
Last change to this card: 29 November 2023