Gorgon Group APT
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
The group has distributed malware via common URL shortening services, particularly Bitly, in addition to traditional command and control domains. Infection is usually achieved via macros in fake documents and spear phishing emails that link to executable files on remote servers. The initial infection stage also attempts to disable antivirus protection and delete virus definition files. The group's emails often have the appearance of being sent from legitimate individuals and have engaging subject lines such as political topics.
The group has used Remote Access Trojans (RATs) and information stealers such as njRAT, NanoCore, Quasar and LokiBot in its activities. Decoy documents may be automatically opened on affected devices to distract users from what is happening in the background.
Remediation advice
To prevent and detect a trojan infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:44 pm