S1197 GoBear
GoBear is a Go-based backdoor that abuses legitimate, stolen certificates for defense evasion purposes. GoBear is exclusively linked to Kimsuky operations.12
| Item | Value |
|---|---|
| ID | S1197 |
| Associated Names | |
| Type | MALWARE |
| Version | 1.0 |
| Created | 17 January 2025 |
| Last Modified | 17 January 2025 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1036 | Masquerading | - |
| enterprise | T1036.005 | Match Legitimate Resource Name or Location | GoBear is installed through droppers masquerading as legitimate, signed software installers.2 |
| enterprise | T1090 | Proxy | GoBear implements SOCKS5 proxy functionality.1 |
| enterprise | T1553 | Subvert Trust Controls | - |
| enterprise | T1553.002 | Code Signing | GoBear uses stolen legitimate code signing certificates for defense evasion.12 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G0094 | Kimsuky | GoBear is exclusively linked to Kimsuky operations.12 |
References
-
Jiho Kim & Sebin Lee, S2W. (2024, February 7). Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer (English ver.). Retrieved January 17, 2025. ↩↩↩↩
-
Symantec Threat Hunter Team. (2024, May 16). Springtail: New Linux Backdoor Added to Toolkit. Retrieved January 17, 2025. ↩↩↩↩