Thursday, August 11, 2016

2016 IT Hacker


On 9 August 2016, OSINT research was collected identifying a potential black hat actor who was placing and testing a Remote Access Trojan (DarkComet) through his domain.  This is an attempt to set a questionable keylogger operation onto unsuspecting victim computers.  We are providing this information for your situational awareness.





Publication date:  10 August 2016
Handling requirements:  Traffic light protocol (TLP) GREEN
Attribution/Threat Actors:  OSINT – Gleaces Juvilian
Actor Type:  Tier I
Potential Targets:  USA / International

This report was published in its entirety to the Financial Services ISAC and Red Sky Alliance portal on August 10, 2016.  For more information, contact Wapack Labs at 844-4-WAPACK.