Subgroup: Pat Bear, APT-C-37 - Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-02 11:25:15 UTC Home > List all groups > Subgroup: Pat Bear, APT-C-37 APT group: Subgroup: Pat Bear, APT-C-37 Names Pat Bear (Qihoo 360) APT-C-37 (Qihoo 360) Racquet Bear (CrowdStrike) Country Syria Sponsor Syrian Electronic Army Motivation Information theft and espionage First seen 2015 Description A subgroup of Syrian Electronic Army (SEA), Deadeye Jackal. (Qihoo 360) Since October 2015, the Pat Bear Organization (APT-C-37) has launched a well-organized, targeted and persistent attack against the “Islamic State”. Watering hole was used to delivery sample in this attack. The malicious samples were mainly disguised as chat software and some common software in specific fields. This Trojan has many functions such as stealing messages, contacts, WhatsApp and Telegram data, and uploading files using FTP. After reversing and correlation, we found that there is a strong correlation between the Pat Bear Organization and the Golden Rat issue, so this attack activity belongs to another branch of the Syrian Electronic Army. Observed Sectors: Defense. Countries: Egypt, Israel and “Islamic State”. Tools used DroidJack, H-Worm, njRAT, SpyNote RAT, SSLove RAT. Information Last change to this card: 01 January 2023 https://apt.etda.or.th/cgi-bin/showcard.cgi?u=01751615-25f0-4ad7-9db9-65abe62e506a Page 1 of 2 Download this actor card in PDF or JSON format Source: https://apt.etda.or.th/cgi-bin/showcard.cgi?u=01751615-25f0-4ad7-9db9-65abe62e506a https://apt.etda.or.th/cgi-bin/showcard.cgi?u=01751615-25f0-4ad7-9db9-65abe62e506a Page 2 of 2