Skip to main content

Gorgon Group APT

Gorgon Group is an Advanced Persistent Threat (APT) group that has conducted targeted attacks against government organisations in the United Kingdom and other nations since February 2018.
Report a cyber attack: call 0300 303 5222 or email [email protected]

This content has been archived

This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk

Summary

Gorgon Group is an Advanced Persistent Threat (APT) group that has conducted targeted attacks against government organisations in the United Kingdom and other nations since February 2018.

Affected platforms

The following platforms are known to be affected:

Threat details

The group has distributed malware via common URL shortening services, particularly Bitly, in addition to traditional command and control domains. Infection is usually achieved via macros in fake documents and spear phishing emails that link to executable files on remote servers. The initial infection stage also attempts to disable antivirus protection and delete virus definition files. The group's emails often have the appearance of being sent from legitimate individuals and have engaging subject lines such as political topics.

The group has used Remote Access Trojans (RATs) and information stealers such as njRAT, NanoCore, Quasar and LokiBot in its activities. Decoy documents may be automatically opened on affected devices to distract users from what is happening in the background.


Remediation advice

To prevent and detect a trojan infection, ensure that:

Remediation steps

Type Step
  • A robust program of education and awareness training is delivered to users to ensure they don’t open attachments or follow links within unsolicited emails.
  • All operating systems, anti-virus and other security products are kept up-to-date.
  • All day-to-day computer activities such as email and internet are performed using non-administrative accounts.
  • Strong password policies are in place.
  • Network, proxy and firewall logs should be monitored for suspicious activity.
  • User accounts accessed from affected devices should be reset on a clean computer.
  • Your organisation adopts a holistic all-round approach to Cyber Security as advocated by the 10 Steps to Cyber Security.

Last edited: 17 February 2020 12:44 pm