Cyclops Blink
MITRE
Tipo Malware:
Other
Other
Prima attivita:
Unknown
Unknown
Ultima attivita:
Unknown
Unknown
Dettagli:
[Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus. [Cyclops Blink](https://attack.mitre.org/software/S0687) is assessed to be a replacement for [VPNFilter](https://attack.mitre.org/software/S1010), a similar platform targeting network devices.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022)
Tecniche Associate (21)
| ID | ATT&CK | Tattiche |
|---|---|---|
| T1005 | Data from Local System | - |
| T1016 | System Network Configuration Discovery | - |
| T1036.005 | Match Legitimate Resource Name or Location | - |
| T1037.004 | RC Scripts | - |
| T1041 | Exfiltration Over C2 Channel | - |
| T1057 | Process Discovery | - |
| T1070.006 | Timestomp | - |
| T1071.001 | Web Protocols | - |
| T1082 | System Information Discovery | - |
| T1083 | File and Directory Discovery | - |
| T1090.003 | Multi-hop Proxy | - |
| T1105 | Ingress Tool Transfer | - |
| T1106 | Native API | - |
| T1132.002 | Non-Standard Encoding | - |
| T1140 | Deobfuscate/Decode Files or Information | - |
Usato da Attori (1)
Metadata
| ID: | 502 |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |