The technique of threat actors deploying torrent files onto torrent sites that are pre-infected with malware has not been widely seen before, especially with respect to BitTorrent-types of attack.

This behavior is difficult to trace and track and is indiscriminate in its infection pattern unless it has some means of targeting desired demographics.

Malware/Threat actors

Name Type Years Source
Jaku malware 2015-2016 report_jaku_analysis_of_botnet_campaign_en_0.pdf

APT37 threat actor 2014-2017 rpt_APT37.pdf

Dukes ThreatActor 2008-2015 dukes_whitepaper.pdf

OnionDuke < threat actor/malware > 2003-2015 ICIT-Brief-Know-Your-Enemies-2.0.pdf

DarkHotel threat actor 2007-2012 stamp.jsp?tp=&arnumber=7460498&tag=1

GRIZZLY STEPPE threat actor 2015-2018 GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity

AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf

Preventions

<Mitigation techniques>

Detections

<Detection techniques>

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References

  • [<Source name>](<Source link>)