{
	"id": "ca89a332-9947-42f8-abe3-6e0b3afd83a7",
	"created_at": "2026-04-06T00:09:26.871218Z",
	"updated_at": "2026-04-10T13:11:48.584159Z",
	"deleted_at": null,
	"sha1_hash": "a9058b879f47b867795c302e1190b67987a1083b",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49033,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 23:42:33 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool CyberGate RAT\n Tool: CyberGate RAT\nNames\nCyberGate RAT\nCyberGate\nRebhip\nCategory Tools\nType Reconnaissance, Backdoor, Info stealer, Exfiltration, Downloader\nDescription\n(Citizen Lab) The CyberGate implant comes with the same credential stealing capabilities as\nthe infector, and is extended by routines to spy on Chrome and STEAM credentials as well.\nAlso inherited from the infector, the implant owns the same anti-analysis routine protecting it\nfrom sandboxes and debuggers.\nBeyond the capabilities seen in the infector, CyberGate has a range of features that provide an\nattacker with a full spectrum of monitoring and remote control functionality.\nCyberGate capabilities include:\n• Collecting detailed information about the infected system\n• Activation and control of the webcam and microphone\n• Screenshot capture\n• Blocking user input (e.g. keyboard and mouse)\n• Control over processes, windows, applications, devices, drive, ports, TCP \u0026 UDP\nconnections, the clipboard, registry keys and values etc.\n• Control over the filesystem\n• Download and execution of further binaries\n• Exfiltration via FTP\n• Collection of information on installed security products\nInformation Malpedia Last change to this tool card: 28 December 2022\nDownload this tool card in JSON format\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ba93b300-b8b3-4a37-8aa5-28a1f3e4014f\nPage 1 of 2\n\nAll groups using tool CyberGate RAT\r\nChanged Name Country Observed\r\nAPT groups\r\n  Operation Layover 2013  \r\n  Packrat [Latin America] 2008  \r\n2 groups listed (2 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ba93b300-b8b3-4a37-8aa5-28a1f3e4014f\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ba93b300-b8b3-4a37-8aa5-28a1f3e4014f\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ba93b300-b8b3-4a37-8aa5-28a1f3e4014f"
	],
	"report_names": [
		"listgroups.cgi?u=ba93b300-b8b3-4a37-8aa5-28a1f3e4014f"
	],
	"threat_actors": [
		{
			"id": "4f5da0b4-5d47-4ae4-87cb-dfcb3c3524ae",
			"created_at": "2022-10-25T16:07:23.96921Z",
			"updated_at": "2026-04-10T02:00:04.812941Z",
			"deleted_at": null,
			"main_name": "Operation Layover",
			"aliases": [],
			"source_name": "ETDA:Operation Layover",
			"tools": [
				"AsyncRAT",
				"Bladabindi",
				"CyberGate",
				"CyberGate RAT",
				"Jorik",
				"Rebhip",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "d001e298-8608-4ee6-96c7-e5afb62d718d",
			"created_at": "2022-10-25T16:07:24.035765Z",
			"updated_at": "2026-04-10T02:00:04.847015Z",
			"deleted_at": null,
			"main_name": "Packrat",
			"aliases": [],
			"source_name": "ETDA:Packrat",
			"tools": [
				"Adwind",
				"Adwind RAT",
				"Adzok",
				"Alien Spy",
				"AlienSpy",
				"CyberGate",
				"CyberGate RAT",
				"ExtRat",
				"Frutas",
				"Invisible Remote Administrator",
				"JBifrost RAT",
				"JSocket",
				"Rebhip",
				"Sockrat",
				"Trojan.Maljava",
				"UnReCoM",
				"Unknown RAT",
				"Unrecom",
				"Xtreme RAT",
				"XtremeRAT",
				"jBiFrost",
				"jConnectPro RAT",
				"jFrutas"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "02a7064e-447b-433e-ac14-6f10d476f517",
			"created_at": "2023-01-06T13:46:38.520097Z",
			"updated_at": "2026-04-10T02:00:03.010392Z",
			"deleted_at": null,
			"main_name": "Packrat",
			"aliases": [],
			"source_name": "MISPGALAXY:Packrat",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434166,
	"ts_updated_at": 1775826708,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a9058b879f47b867795c302e1190b67987a1083b.pdf",
		"text": "https://archive.orkl.eu/a9058b879f47b867795c302e1190b67987a1083b.txt",
		"img": "https://archive.orkl.eu/a9058b879f47b867795c302e1190b67987a1083b.jpg"
	}
}