Common Information
Type | Value |
---|---|
Value |
Calypso |
Category | Actor |
Type | Threat-Actor |
Misp Type | Cluster |
Description | For the first time, the activity of the Calypso group was detected by specialists of PT Expert Security Center in March 2019, during the work to detect cyber threats. As a result, many malware samples of this group were obtained, affected organizations and control servers of intruders were identified. According to our data, the group has been active since at least September 2016. The main goal of the group is to steal confidential data, the main victims are government agencies from Brazil, India, Kazakhstan, Russia, Thailand, Turkey. Our data suggest that the group has Asian roots. Description translated from Russian. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-06-11 | 5 | Noodle RAT Reviewing the Backdoor Used by Chinese-Speaking Groups | ||
Details | Website | 2024-06-11 | 6 | Noodle RAT Reviewing the Backdoor Used by Chinese-Speaking Groups | ||
Details | Website | 2023-07-24 | 418 | RST TI Report Digest: 24 Jul 2023 | ||
Details | Website | 2023-07-14 | 1 | Hackers target Pakistani government, bank and telecom provider with China-made malware | ||
Details | Website | 2023-07-14 | 41 | Possible Supply Chain Attack Targeting Pakistani Government Delivers Shadowpad | ||
Details | Website | 2023-06-27 | 2 | CalypsoAI Raises $23 Million for AI Security Tech | ||
Details | Website | 2023-06-26 | 0 | M365 Copilot, Microsoft’s generative AI tool, explained | ||
Details | Website | 2023-05-03 | 0 | RSA Conference 2023 — What You Need to Know About Cybersecurity | ||
Details | Website | 2023-02-27 | 138 | ASEC Weekly Phishing Email Threat Trends (February 12th, 2023 – February 18th, 2023) - ASEC BLOG | ||
Details | Website | 2023-02-23 | 137 | ASEC 주간 피싱 이메일 위협 트렌드 (20230212 ~ 20230218) - ASEC BLOG | ||
Details | Website | 2023-02-13 | 127 | ASEC Weekly Phishing Email Threat Trends (January 29th, 2023 – February 4th, 2023) - ASEC BLOG | ||
Details | Website | 2023-02-10 | 128 | ASEC 주간 피싱 이메일 위협 트렌드 (20230129 ~ 20230204) - ASEC BLOG | ||
Details | Website | 2022-12-13 | 53 | ASEC Weekly Phishing Email Threat Trends (November 27th, 2022 – December 3rd, 2022) - ASEC BLOG | ||
Details | Website | 2022-12-07 | 51 | ASEC 주간 피싱 이메일 위협 트렌드 (20221127 ~ 20221203) - ASEC BLOG | ||
Details | Website | 2022-11-23 | 7 | From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations | ||
Details | Website | 2022-05-05 | 11 | X-Force Research Update: Top 10 Cybersecurity Vulnerabilities of 2021 | ||
Details | Website | 2021-10-26 | 14 | China cyber attacks: the current threat landscape | ||
Details | Website | 2021-06-10 | 117 | BackdoorDiplomacy: Upgrading from Quarian to Turian | WeLiveSecurity | ||
Details | Website | 2021-03-10 | 40 | Examining Exchange Exploitation and its Lessons for Defenders - DomainTools | Start Here. Know Now. | ||
Details | Website | 2021-03-05 | 72 | Detecting Exploitation of chainable zero-days vulnerabilities in Microsoft Exchange server | ||
Details | Website | 2020-05-14 | 29 | The energy reserves in the Eastern Mediterranean Sea and a malicious campaign of APT10 against Turkey | ||
Details | Website | 2020-01-27 | 0 | How Remote Access Trojans Affect the Enterprise | ||
Details | Website | 2016-03-16 | 174 | Jump List Forensics: AppID Master List (400+ AppIDs) | ||
Details | Website | 2016-01-06 | 3 | The 2015 WordPress.com Year In Review! | ||
Details | Website | 2010-08-27 | 1 | Are Hackers Speeding on the Information Highway? |