Common Information
Type Value
Value
Calypso
Category Actor
Type Threat-Actor
Misp Type Cluster
Description For the first time, the activity of the Calypso group was detected by specialists of PT Expert Security Center in March 2019, during the work to detect cyber threats. As a result, many malware samples of this group were obtained, affected organizations and control servers of intruders were identified. According to our data, the group has been active since at least September 2016. The main goal of the group is to steal confidential data, the main victims are government agencies from Brazil, India, Kazakhstan, Russia, Thailand, Turkey. Our data suggest that the group has Asian roots. Description translated from Russian.
Details Published Attributes CTI Title
Details Website 2024-06-11 5 Noodle RAT Reviewing the Backdoor Used by Chinese-Speaking Groups
Details Website 2024-06-11 6 Noodle RAT Reviewing the Backdoor Used by Chinese-Speaking Groups
Details Website 2023-07-24 418 RST TI Report Digest: 24 Jul 2023
Details Website 2023-07-14 1 Hackers target Pakistani government, bank and telecom provider with China-made malware
Details Website 2023-07-14 41 Possible Supply Chain Attack Targeting Pakistani Government Delivers Shadowpad
Details Website 2023-06-27 2 CalypsoAI Raises $23 Million for AI Security Tech
Details Website 2023-06-26 0 M365 Copilot, Microsoft’s generative AI tool, explained
Details Website 2023-05-03 0 RSA Conference 2023 — What You Need to Know About Cybersecurity
Details Website 2023-02-27 138 ASEC Weekly Phishing Email Threat Trends (February 12th, 2023 – February 18th, 2023) - ASEC BLOG
Details Website 2023-02-23 137 ASEC 주간 피싱 이메일 위협 트렌드 (20230212 ~ 20230218) - ASEC BLOG
Details Website 2023-02-13 127 ASEC Weekly Phishing Email Threat Trends (January 29th, 2023 – February 4th, 2023) - ASEC BLOG
Details Website 2023-02-10 128 ASEC 주간 피싱 이메일 위협 트렌드 (20230129 ~ 20230204) - ASEC BLOG
Details Website 2022-12-13 53 ASEC Weekly Phishing Email Threat Trends (November 27th, 2022 – December 3rd, 2022) - ASEC BLOG
Details Website 2022-12-07 51 ASEC 주간 피싱 이메일 위협 트렌드 (20221127 ~ 20221203) - ASEC BLOG
Details Website 2022-11-23 7 From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations
Details Website 2022-05-05 11 X-Force Research Update: Top 10 Cybersecurity Vulnerabilities of 2021
Details Website 2021-10-26 14 China cyber attacks: the current threat landscape
Details Website 2021-06-10 117 BackdoorDiplomacy: Upgrading from Quarian to Turian | WeLiveSecurity
Details Website 2021-03-10 40 Examining Exchange Exploitation and its Lessons for Defenders - DomainTools | Start Here. Know Now.
Details Website 2021-03-05 72 Detecting Exploitation of chainable zero-days vulnerabilities in Microsoft Exchange server
Details Website 2020-05-14 29 The energy reserves in the Eastern Mediterranean Sea and a malicious campaign of APT10 against Turkey
Details Website 2020-01-27 0 How Remote Access Trojans Affect the Enterprise
Details Website 2016-03-16 174 Jump List Forensics: AppID Master List (400+ AppIDs)
Details Website 2016-01-06 3 The 2015 WordPress.com Year In Review!
Details Website 2010-08-27 1 Are Hackers Speeding on the Information Highway?