Stealth Falcon
Stealth Falcon is a threat group that has conducted targeted spyware attacks against Emirati journalists, activists, and dissidents since at least 2012. Circumstantial evidence suggests a possible link between this group and the United Arab Emirates (UAE) government, but this has not been confirmed.
Other names for this threat
FruityArmor
This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.
- Suspicious DNS Request - Stealth Falcon Related Domain Observed
- Suspicious Process - Stealth Falcon Related Binary Executed
- Suspicious Web Request - Stealth Falcon Related Domain Observed
Suspicious DNS Request - Stealth Falcon Related Domain Observed
Description
This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.
Recommendation
The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.
Suspicious Process - Stealth Falcon Related Binary Executed
Description
This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.
Recommendation
Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.
Suspicious Web Request - Stealth Falcon Related Domain Observed
Description
This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.
Recommendation
The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.