Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

Ghostr (Cybercriminal) – Threat Actor

March 2, 2025
Reading Time: 3 mins read
in Threat Actors
Ghostr (Cybercriminal) – Threat Actor

Ghostr

Location

China

Date of initial activity

2017


Suspected attribution

Cybercriminal


Government Affiliation

No

Associated Groups

APT10(MenuPass, POTASSIUM, Stone Panda, Red Apollo, and CVNX)

Motivation

Financial Gain

Associated Tools

Poison Ivy, Plugx

Overview

GHOSTR is a sophisticated and financially motivated cyber threat actor believed to have strong ties with China. The group’s activities have garnered significant attention due to their advanced tactics and high-profile targets. GHOSTR’s operations are marked by a combination of stealth, precision, and persistence, reflecting their expertise in executing large-scale cyberattacks. Their focus on extracting sensitive and valuable information underscores their primary objective: financial gain and strategic advantage. Active on various underground platforms, including Breachforums.is, GHOSTR has made headlines by leaking substantial amounts of stolen data. One of their most notable breaches involved a confidential database from the World-Check, which contained 5.3 million records. In another significant incident, GHOSTR leaked approximately 186GB of data from a stock trading platform. These breaches highlight the group’s capability to compromise and exfiltrate large volumes of sensitive information, making them a formidable player in the cybercriminal landscape. GHOSTR’s activities have extended to targeting individuals and organizations across multiple sectors. Their operations are characterized by a detailed and methodical approach to data theft, often involving the exploitation of advanced techniques and tools. By focusing on sectors that handle substantial amounts of sensitive data, such as financial services and trading platforms, GHOSTR positions itself as a major threat to data security and privacy on a global scale.

Common targets

Government, Military and Economic sectors

Attack Vectors

Social Engineering, Phishing, Malicious Downloads

How they operate

The operation begins with initial access, where GHOSTR uses spear-phishing campaigns and exploits zero-day vulnerabilities to gain entry into targeted networks. These spear-phishing emails are meticulously crafted to appear legitimate, often mimicking trusted entities to increase the likelihood of success. Once inside, GHOSTR deploys custom malware, including remote access Trojans (RATs) like PlugX and Poison Ivy, to establish a persistent foothold within the compromised environment. This malware enables the group to maintain control over the system, execute commands, and facilitate further malicious activities. Privilege escalation is a critical phase in GHOSTR’s operations. After gaining initial access, the group employs various techniques to elevate their privileges within the network. This may involve exploiting software vulnerabilities or using stolen credentials to access higher-level accounts. With elevated privileges, GHOSTR can move laterally across the network, accessing additional systems and data repositories. This lateral movement is often achieved through methods such as credential theft and exploitation of network shares, allowing the group to expand their control and gather more sensitive information. Data collection and exfiltration are central to GHOSTR’s operations. The group focuses on extracting valuable data, including personal, financial, and confidential business information. They employ encrypted channels and stealthy methods to exfiltrate this data from the compromised network, minimizing the risk of detection. The stolen data is often sold or leaked on underground forums, providing GHOSTR with financial gains or strategic advantages. To maintain their operational security, GHOSTR employs various evasion techniques. They use encryption to protect their communications and data, and regularly update their tactics and tools to stay ahead of security defenses. The group also practices meticulous cleanup, removing traces of their activities to avoid detection and prolong their access to compromised systems.

MITRE Tactics and Techniques

Initial Access
T1071: Application Layer Protocol T1193: Spear Phishing Link T1192: Spear Phishing Attachment
Execution
T1059: Command and Scripting Interpreter T1106: Native API
Persistence
T1547: Boot or Logon Autostart Execution T1060: Registry Run Keys / Start Folder
Privilege Escalation
T1068: Exploitation for Privilege Escalation T1078: Valid Accounts
Defense Evasion
T1027: Obfuscated Files or Information T1070: Indicator Removal on Host
Credential Access
T1003: Credential Dumping T1555: Credentials from Password Stores
Lateral Movement
T1021: Remote Services T1075: Pass the Ticket
Collection
T1005: Data from Local System T1025: Data from Information Repositories
Exfiltration
T1041: Exfiltration Over Command and Control Channel T1048: Exfiltration Over Alternative Protocol
Impact
T1499: Endpoint Denial of Service T1203: Exploitation for Client Execution  
References:
  • Ghostr Details
Tags: APT10BreachForumsChinaCyber threatEmailsGhostRGovernmentMilitaryPhishingPlugXPoison IvyThreat Actors
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Vishing Scam Bypasses Google 2FA

New Linux Flaws Allow Easy Root Access

Google Fixes GerriScary Supply Chain Flaw

Langflow Flaw Delivers Flodrix DDoS Botnet

Subscribe to our newsletter

    Latest Incidents

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    Cyberattack Disrupts Paris Air Show Website

    Scania Insurance Data Stolen In Partner Hack

    Pro Israel Group Claims $81M Nobitex Hack

    Hacker Sells Data Of 1M Cock.li Users

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial