Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-05 17:56:46 UTC APT group: WildPressure Names WilePressure (Kaspersky) Country [Unknown] Motivation Information theft and espionage First seen 2019 Description (Kaspersky) In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum. All the victims we registered were organizations from the Middle East. At least some of them are related to industrial sector. Our Kaspersky Threat Attribution Engine (KTAE) doesn’t show any code similarities with known campaigns. Nor have we seen any target intersections. In fact, we found just three almost unique samples, all in one country. So we consider the attacks to be targeted and have currently named this operation WildPressure. Observed Sectors: Industrial, Oil and gas. Countries: Middle East. Tools used Milum. Operations performed Spring 2021 WildPressure targets the macOS platform Information Last change to this card: 09 August 2021 Download this actor card in PDF or JSON format Source: https://apt.etda.or.th/cgi-bin/showcard.cgi?u=d89b8e99-b7bf-42bb-aa53-82954e599395 https://apt.etda.or.th/cgi-bin/showcard.cgi?u=d89b8e99-b7bf-42bb-aa53-82954e599395 Page 1 of 1