Adwind

  • First known sample

    2012
  • Discovery

    2013
  • Number of targets

    10000-300000
  • Current status

    Active
  • Type

    Backdoor , Complex cyberattack platform
  • Targeted platforms

    Android , Linux , OS X , Windows
  • TOP targeted countries

    Germany , Hong Kong , India , Italy , Russia , Taiwan , Turkey , USA
ADWIND

More about the Adwind backdoor, its targets and capabilities

Learn more
  • The way of propagation

    Exploits , Social engineering
  • Purpose/Functions

    Cyberespionage , Surveillance
  • Special features

    Malware-as-a-Service platform

  • Targets

    Design , Education , Engineering , Financial institutions , Government entities , Healthcare , Manufacturing , Mass media and TV , Shipping , Software companies , Telecoms , Trade and commerce
  • Artefacts/Attribution

    Brazilian Portuguese language artefacts

  • Description

    A cross-platform remote-access tool (RAT). This backdoor is available for purchase and attacked more than 440,000 users around the world between 2012 and 2016. The victims range from random people that launched the malware following an opportunistic attack, to specific organizations, most of which are small and medium-sized businesses. It’s most likely used by scammers, unfair competitors, and cyber-mercenaries looking to gather information that will further their objectives.

    Additional information