La tua posizione Home  :: Libreria articoli :: CyberSecurity :: Threat Actors -> Careto

 
      Menu principale
  Home
      About: Totocellux
      LinkedIn
      X (Twitter)
      GitHub
  Libreria articoli
      Avvisi Portale
      Software
      Hardware
      CyberSecurity
      Networking
      Telefonia
      Virtualizzazione
  Galleria Web
  Forum

Benvenuto Ospite, nel Portale Campolo.eu:
se sei già utente effettua il login,
altrimenti puoi facilmente registrarti.

[Registrati] [Login]

      Skin
Seleziona la skin dell'interfaccia

      Moduli
XML - Risorsa di notizie
Consiglia Campolo.eu ai tuoi amici

      Sondaggio settimanale
What do you think of Phoenix?
 
Creative AND Clean
Creative NOT Clean
NOT Creative BUT Clean
NOT (Creative AND Clean)

      Careto
espandi info/opzioni dell'articolo | Opzioni articolo | Sommario |
Names Careto (Kaspersky) The Mask (Kaspersky) Mask (Kaspersky) Ugly Face (Kaspersky) Country [Unknown] Sponsor State-sponsored Motivation Information theft and espionage First seen 2007 Description (Kaspersky) The Mask is an advanced threat actor that has been involved in cyber-espionage operations since at least 2007. The name “Mask” comes from the Spanish slang word “Careto” (“Ugly Face” or “Mask”) which the authors included in some of the malware modules. More than 380 unique victims in 31 countries have been observed to date. What makes “The Mask” special is the complexity of the toolset used by the attackers. This includes an extremely sophisticated malware, a rootkit, a bootkit, 32-and 64-bit Windows versions, Mac OS X and Linux versions and possibly versions for Android and iPad/iPhone (Apple iOS). Observed Sectors: Education, Energy, Government and Diplomatic missions. Countries: Brazil, France, Germany, Iran, Libya, Morocco, Poland, South Africa, Spain, Switzerland, Tunisia, UK, USA, Venezuela. Tools used Careto. Operations performed 2022 Careto is back: what’s new after 10 years of silence? Counter operations Feb 2014 At the moment, all known Careto C&C servers are offline. The attackers began taking them offline in January 2014. We were also able to sinkhole several C&C servers, which allowed us to gather statistics on the operation. Information Last change to this card: 27 December 2024
 
a Threat Actors
a libreria articoli
Home 

 
      Statistiche del Portale
numero di categorie: [ 44 ] / numero di articoli: [ 108 ]
Numero di collaboratori registrati localmente: [ 4 ]
Numero di accessi unici: [ 847 ]

 
This site is Phoenix Technology Enabled tempo di generazione pagina: [0.039063] secondi
Si consiglia l'uso del browser Google Chrome!!
Powered by Phoenix (UglySabiSkinner)
:: Informativa privacy/cookies ::
Contatta l'Amministratore