Wild Neutron, Butterfly, Sphinx Moth Archived: 2026-04-02 11:32:58 UTC Home > List all groups > Wild Neutron, Butterfly, Sphinx Moth APT group: Wild Neutron, Butterfly, Sphinx Moth Names Wild Neutron (Kaspersky) Butterfly (Symantec) Morpho (Symantec) Sphinx Moth (Kudeslski) The Postal Group (CERT Polska) Country [Unknown] Motivation Information theft and espionage First seen 2013 Description (Symantec) A corporate espionage group has compromised a string of major corporations over the past three years in order to steal confidential information and intellectual property. The gang, which Symantec calls Butterfly, is not-state sponsored, rather financially motivated. It has attacked multi-billion dollar companies operating in the internet, IT software, pharmaceutical, and commodities sectors. Twitter, Facebook, Apple, and Microsoft are among the companies who have publicly acknowledged attacks. Butterfly is technically proficient and well resourced. The group has developed a suite of custom malware tools capable of attacking both Windows and Apple computers, and appears to have used at least one zero-day vulnerability in its attacks. It keeps a low profile and maintains good operational security. After successfully compromising a target organization, it cleans up after itself before moving on to its next target. This group operates at a much higher level than the average cybercrime gang. It is not interested in stealing credit card details or customer databases and is instead focused on high-level corporate information. Butterfly may be selling this information to the highest bidder or may be operating as hackers for hire. Stolen information could also be used for insider-trading purposes. Observed Sectors: Financial, Healthcare, IT and Bitcoin-related companies, Investment companies, Real estate, lawyers and individual users. https://apt.etda.or.th/cgi-bin/showcard.cgi?u=00884ba1-39b4-4b67-bc3c-21167524f868 Page 1 of 2 Countries: Algeria, Australia, Austria, Canada, France, Germany, Kazakhstan, Palestine, Poland, Russia, Slovenia, Spain, Switzerland, UAE, UK, USA. Tools used HesperBot, JripBot and many 0-days vulnerabilities. Operations performed Jan 2013 Attack on Twitter Feb 2013 Attack on Facebook Feb 2013 Attack on Apple Feb 2013 Attack on Microsoft Information Last change to this card: 14 April 2020 Download this actor card in PDF or JSON format Source: https://apt.etda.or.th/cgi-bin/showcard.cgi?u=00884ba1-39b4-4b67-bc3c-21167524f868 https://apt.etda.or.th/cgi-bin/showcard.cgi?u=00884ba1-39b4-4b67-bc3c-21167524f868 Page 2 of 2