On 9 August 2016, OSINT research was collected identifying a potential black hat actor who was placing and testing a Remote Access Trojan (DarkComet) through his domain. This is an attempt to set a questionable keylogger operation onto unsuspecting victim computers. We are providing this information for your situational awareness.
Publication date: 10 August 2016
Handling requirements: Traffic light protocol (TLP) GREEN
Attribution/Threat Actors: OSINT – Gleaces Juvilian
Actor Type: Tier I
Potential Targets: USA / International
This report was published in its entirety to the Financial Services ISAC and Red Sky Alliance portal on August 10, 2016. For more information, contact Wapack Labs at 844-4-WAPACK.