Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-05 16:35:34 UTC Home > List all groups > List all tools > List all groups using tool Slingshot Tool: Slingshot Names Slingshot Category Malware Type Loader Description (Kaspersky) While analysing an incident which involved a suspected keylogger, we identified a malicious library able to interact with a virtual file system, which is usually the sign of an advanced APT actor. This turned out to be a malicious loader internally named ‘Slingshot’, part of a new, and highly sophisticated attack platform that rivals Project Sauron and Regin in complexity. The initial loader replaces the victim´s legitimate Windows library ‘scesrv.dll’ with a malicious one of exactly the same size. Not only that, it interacts with several other modules including a ring-0 loader, kernel-mode network sniffer, own base-independent packer, and virtual filesystem, among others. Following infection, Slingshot would load a number of modules onto the victim device, including two huge and powerful ones: Cahnadr, the kernel mode module, and GollumApp, a user mode module. The two modules are connected and able to support each other in information gathering, persistence and data exfiltration. Information Malpedia Last change to this tool card: 24 April 2021 Download this tool card in JSON format All groups using tool Slingshot Changed Name Country Observed https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=24bf0029-00d6-4eb3-9410-922221a07e36 Page 1 of 2 APT groups   Slingshot [Unknown] 2012   1 group listed (1 APT, 0 other, 0 unknown) Source: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=24bf0029-00d6-4eb3-9410-922221a07e36 https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=24bf0029-00d6-4eb3-9410-922221a07e36 Page 2 of 2