WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Actor Provided APT and Ransomware Gangs Initial Access to Australian Businesses, according to BlackBerry Report
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Actor Provided APT and Ransomware Gangs Initial Access to Australian Businesses, according to BlackBerry Report

Author: Alec Davison

Created: Tuesday, November 9, 2021 - 19:32

Categories: Cybersecurity

A recent report from security researchers at Blackberry has discovered an initial access broker, identified as Zebra2104, with links to cyber criminal groups and advanced persistent threat (APT) actors involved in ransomware and phishing activities. The report notes that after Zebra2104 gained initial access to a victim’s device or network and established a reliable backdoor into the network. The actor then advertised their access to these compromised systems on the Dark Web. Zebra2104 provided access to ransomware groups such as MountLocker and Phobos as well as the StrongPity APT. The victim companies were mostly in Australia and Turkey. According to the Blackberry researchers, “the interlinking web of malicious infrastructure seen throughout this research has shown that, in a manner that mirrors the legitimate business world, cybercrime groups are in some cases run not unlike multinational organizations… it is safe to assume that these threat group “business partnerships” are going to become even more prevalent in [the] future.” Read the full report here or access a relevant article at Zdnet.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar