{"total_rows":1290,"offset":1122,"rows":[ {"id":"map-kiCDzLBF","key":"Map","value":{"_id":"map-kiCDzLBF","_rev":"25-fa4d80dadaa42a8d0fc9819d53973f3c","type":"Map","description":"

APT-C-23

\n\nSeveral security vendors have been keeping track of a targeted attack against the Middle East region, specifically the Palestinian Authority. Components of this attack have been given various names, such as FrozenCell, AridViper, Micropsia and more.\n\nAlthough this campaign is quite dynamic and uses multiple attack vectors, some of the TTPs remain unchanged. For example, the domains that are used usually have the names of actors or characters from renowned TV shows.\n\nThe purpose of this graph is to organize the indicators of compromised gathered by different security vendors and categorize the domains used by this campaign.\n\nIf you think something is missing from this graph, or you have any information to contribute to this research, please do not hesitate to contact me on Twitter: [@CurlyCyber](https://twitter.com/curlycyber)\n\nSources:\n[Symantec: Ongoing Android Malware Campaign Targets Palestinians](https://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-1)\n[ClearSky: Micropsia](https://docs.google.com/document/d/1oYX3uN6KxIX_StzTH0s0yFNNoHDnV8VgmVqU5WoeErc/edit#)\n[Radware: Micropsia](https://blog.radware.com/security/2018/07/micropsia-malware/)\n[Check Point: Big Bang APT](https://research.checkpoint.com/apt-attack-middle-east-big-bang/)\n[Talos: Palestinian Delphi](https://blog.talosintelligence.com/2017/06/palestine-delphi.html)\n[Lookout: FrozenCell](https://blog.lookout.com/frozencell-mobile-threat)\n[Lookout: FrozenCell](https://blog.lookout.com/desert-scorpion-google-play)\n[TrendMicro: GnatSpy](https://blog.trendmicro.com/trendlabs-security-intelligence/new-gnatspy-mobile-malware-family-discovered/)\n[Palo Alto Networks: Micropsia](https://researchcenter.paloaltonetworks.com/2017/04/unit42-targeted-attacks-middle-east-using-kasperagent-micropsia)\n[360 Security: APT-C-23](http://blogs.360.cn/blog/%E5%8F%8C%E5%B0%BE%E8%9D%8E%E7%BB%84%E7%BB%87%EF%BC%88apt-c-23%EF%BC%89%E4%BC%B8%E5%90%91%E5%B7%B4%E4%BB%A5%E4%B8%A4%E5%9B%BD%E7%9A%84%E6%AF%92%E9%92%88/)\n\n\nInspired by the [CyberWar Map](https://embed.kumu.io/0b023bf1a971ba32510e86e8f1a38c38#apt-index)","scale":1,"default_perspective_id":"pers-CbuuiO0N","default_element_behavior":"floating","default_connection_direction":"undirected","name":"APT-C-23","created_at":"2018-07-19T17:44:53.100Z","updated_at":"2018-09-25T08:58:59.763Z","center":{"x":0,"y":0}}} ]}