id
stringlengths
14
15
text
stringlengths
96
2.14k
source
stringlengths
6
21
9d1ad4ec8c47-4
FIN6 has used credentials stolen from various systems on which it gathered usernames and password hashes.(Citation: FireEye FIN6 April 2016)(Citation: FireEye FIN6 Apr 2019)(Citation: Visa FIN6 Feb 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1560.003|Archive via Custom Method| FIN6 has encod...
FIN6.md
9d1ad4ec8c47-5
FIN6 has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS.(Citation: FireEye FIN6 April 2016)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| FIN6 has used Registry Run ke...
FIN6.md
9d1ad4ec8c47-6
FIN6 has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener.(Citation: FireEye FIN6 April 2016)(Citation: FireEye FIN6 Apr 2019)(Citation: Visa FIN6 Feb 2019)|
FIN6.md
ba5976cbfaeb-0
FIN7 - G0046 Created: 2017-05-31T21:32:09.460Z Modified: 2023-03-22T03:51:04.185Z Contributors: Edward Millington Aliases FIN7,GOLD NIAGARA,ITG14,Carbon Spider Description FIN7 is a financially-motivated threat group that has been active since 2013 primarily targeting the U.S. retail, restaurant, and hospitality...
FIN7.md
ba5976cbfaeb-1
FIN7 has used TightVNC to control compromised hosts.(Citation: CrowdStrike Carbon Spider August 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,IaaS|T1486|Data Encrypted for Impact| FIN7 has encrypted virtual disk volumes on ESXi servers using a version of Darkside ransomware.(Citation: CrowdStri...
FIN7.md
ba5976cbfaeb-2
FIN7 has attempted to run Darkside ransomware with the filename sleep.exe.(Citation: CrowdStrike Carbon Spider August 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| FIN7 has conducted broad phishing campaigns using malicious links.(C...
FIN7.md
ba5976cbfaeb-3
FIN7 used JavaScript scripts to help perform tasks on the victim's machine.(Citation: FireEye FIN7 Aug 2018)(Citation: Flashpoint FIN 7 March 2019)(Citation: FireEye FIN7 Aug 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1571|Non-Standard Port| FIN7 has used port-protocol mismatches on ports s...
FIN7.md
ba5976cbfaeb-4
FIN7 created a custom video recording capability that could be used to monitor operations in the victim's environment.(Citation: FireEye FIN7 Aug 2018)(Citation: DOJ FIN7 Aug 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1543.003|Windows Service| FIN7 created new Windows services and added them to the sta...
FIN7.md
ba5976cbfaeb-5
FIN7 has performed C2 using DNS via A, OPT, and TXT records.(Citation: FireEye FIN7 Aug 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1113|Screen Capture| FIN7 captured screenshots and desktop video recordings.(Citation: DOJ FIN7 Aug 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macO...
FIN7.md
ba5976cbfaeb-6
FIN7 malware has created scheduled tasks to establish persistence.(Citation: FireEye FIN7 April 2017)(Citation: Morphisec FIN7 June 2017)(Citation: FireEye FIN7 Aug 2018)(Citation: Flashpoint FIN 7 March 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| FIN7 has downloa...
FIN7.md
91041801a327-0
FIN8 - G0061 Created: 2018-04-18T17:59:24.739Z Modified: 2023-03-22T03:52:13.089Z Contributors: Daniyal Naeem, BT Security Aliases FIN8 Description FIN8 is a financially motivated threat group known to launch tailored spearphishing campaigns targeting the retail, restaurant, and hospitality industries. (Citation...
FIN8.md
91041801a327-1
FIN8 has used malicious e-mail attachments to lure victims into executing malware.(Citation: FireEye Obfuscation June 2017)(Citation: FireEye Fin8 May 2016)(Citation: FireEye Know Your Enemy FIN8 Aug 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation| FIN8...
FIN8.md
91041801a327-2
FIN8 has used RDP for lateral movement.(Citation: FireEye Know Your Enemy FIN8 Aug 2016)| |mitre-attack|enterprise-attack|Windows|T1112|Modify Registry| FIN8 has deleted Registry keys during post compromise cleanup activities.(Citation: FireEye Know Your Enemy FIN8 Aug 2016)| |mitre-attack|enterprise-attack|Windows,Ia...
FIN8.md
91041801a327-3
FIN8 has used FTP to exfiltrate collected data.(Citation: FireEye Know Your Enemy FIN8 Aug 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| FIN8 has deleted tmp and prefetch files during post compromise cleanup activities.(Citation: FireEye Know Your Enemy FIN8 Aug 2016)| |mitre-atta...
FIN8.md
91041801a327-4
FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities.(Citation: FireEye Know Your Enemy FIN8 Aug 2016) FIN8 has also executed commands remotely via cmd.(Citation: FireEye Obfuscation June 2017)(Citation: Bitdefender FIN8 July 2021)|
FIN8.md
824bc7e5d484-0
Fox Kitten - G0117 Created: 2020-12-21T21:49:47.307Z Modified: 2023-03-22T03:53:37.888Z Contributors: Aliases Fox Kitten,UNC757,Parisite,Pioneer Kitten Description Fox Kitten is threat actor with a suspected nexus to the Iranian government that has been active since at least 2017 against entities in the Middle E...
Fox_Kitten.md
824bc7e5d484-1
Fox Kitten has used the open source reverse proxy tools including FRPC and Go Proxy to establish connections from C2 to local servers.(Citation: CISA AA20-259A Iran-Based Actor September 2020)(Citation: ClearSky Pay2Kitten December 2020)(Citation: Check Point Pay2Key November 2020)| |mitre-attack|enterprise-attack|Linu...
Fox_Kitten.md
824bc7e5d484-2
Fox Kitten has searched local system resources to access sensitive documents.(Citation: CISA AA20-259A Iran-Based Actor September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1039|Data from Network Shared Drive| Fox Kitten has searched network shares to access sensitive documents.(Citation: CISA AA20-25...
Fox_Kitten.md
824bc7e5d484-3
Fox Kitten has used RDP to log in and move laterally in the target environment.(Citation: CISA AA20-259A Iran-Based Actor September 2020)(Citation: ClearSky Pay2Kitten December 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1087.002|Domain Account| Fox Kitten has used the Softerra LDAP browser to browse d...
Fox_Kitten.md
824bc7e5d484-4
Fox Kitten has accessed files to gain valid credentials.(Citation: CISA AA20-259A Iran-Based Actor September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1555.005|Password Managers| Fox Kitten has used scripts to access credential information from the KeePass database.(Citation: CISA AA20-259A Iran-Base...
Fox_Kitten.md
824bc7e5d484-5
Fox Kitten has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary.(Citation: CISA AA20-259A Iran-Based Actor September 2020)(Citation: ClearSky Pay2Kitten December 2020)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Fox Kitten has used cmd.exe likely as a pa...
Fox_Kitten.md
824bc7e5d484-6
Fox Kitten has exploited known vulnerabilities in Fortinet, PulseSecure, and Palo Alto VPN appliances.(Citation: ClearkSky Fox Kitten February 2020)(Citation: Dragos PARISITE )(Citation: CrowdStrike PIONEER KITTEN August 2020)(Citation: CISA AA20-259A Iran-Based Actor September 2020)(Citation: ClearSky Pay2Kitten Decem...
Fox_Kitten.md
4873e8a7a0a3-0
GALLIUM - G0093 Created: 2019-07-18T20:47:50.050Z Modified: 2022-08-12T21:26:22.303Z Contributors: Daniyal Naeem, BT Security,Cybereason Nocturnus, @nocturnus Aliases GALLIUM,Operation Soft Cell Description GALLIUM is a cyberespionage group that has been active since at least 2012, primarily targeting telecommun...
GALLIUM.md
4873e8a7a0a3-1
GALLIUM used Web shells and HTRAN for C2 and to exfiltrate data.(Citation: Cybereason Soft Cell June 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.005|Indicator Removal from Tools| GALLIUM ensured each payload had a unique hash, including by using different types of packers.(Citation: Cybereason So...
GALLIUM.md
4873e8a7a0a3-2
GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.(Citation: Cybereason Soft Cell June 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1090.002|External Proxy| GALLIUM used a modified version of HTRAN to redirect con...
GALLIUM.md
4873e8a7a0a3-3
GALLIUM used a modified version of Mimikatz along with a PowerShell-based Mimikatz to dump credentials on the victim machines.(Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019)| |mitre-attack|enterprise-attack|Windows|T1003.002|Security Account Manager| GALLIUM used GALLIUM used t...
GALLIUM.md
4873e8a7a0a3-4
GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine.(Citation: Cybereason Soft Cell June 2019)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| GALLIUM exploited a publicly-facing servers including Wildfly/JBos...
GALLIUM.md
d9fc3549a483-0
Gallmaker - G0084 Created: 2019-01-30T14:26:42.897Z Modified: 2020-03-30T19:04:47.798Z Contributors: Aliases Gallmaker Description Gallmaker is a cyberespionage group that has targeted victims in the Middle East and has been active since at least December 2017. The group has mainly targeted victims in the defens...
Gallmaker.md
40c14a533669-0
Gamaredon Group - G0047 Created: 2017-05-31T21:32:09.849Z Modified: 2023-03-22T04:29:39.915Z Contributors: ESET,Trend Micro Incorporated Aliases Gamaredon Group,IRON TILDEN,Primitive Bear,ACTINIUM,Armageddon,Shuckworm,DEV-0157 Description Gamaredon Group is a suspected Russian cyber espionage threat group that h...
Gamaredon_Group.md
40c14a533669-1
Gamaredon Group has incorporated dynamic DNS domains in its infrastructure.(Citation: Unit 42 Gamaredon February 2022)| |mitre-attack|enterprise-attack|PRE|T1608.001|Upload Malware| Gamaredon Group has registered domains to stage payloads.(Citation: Microsoft Actinium February 2022)(Citation: Unit 42 Gamaredon Februar...
Gamaredon_Group.md
40c14a533669-2
Gamaredon Group has used VNC tools, including UltraVNC, to remotely interact with compromised hosts.(Citation: Symantec Shuckworm January 2022)(Citation: Microsoft Actinium February 2022)(Citation: Unit 42 Gamaredon February 2022)| |mitre-attack|enterprise-attack|Windows|T1218.011|Rundll32| Gamaredon Group malware has...
Gamaredon_Group.md
40c14a533669-3
Gamaredon Group has removed security settings for VBA macro execution by changing registry values Gamaredon Group has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization.(Citation: ESET Gamaredon June 2020)| |mitre-attack|enterpri...
Gamaredon_Group.md
40c14a533669-4
Gamaredon Group malware can insert malicious macros into documents using a Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.(Citation: ESET Gamaredon June 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1113|Screen Capture| Gamaredon Group's malware can take scree...
Gamaredon_Group.md
40c14a533669-5
Gamaredon Group has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads.(Citation: Proofpoint RTF Injection) Gamaredon Group can also inject malicious macros or remote templates into documents already present on compromised systems.(Citation: ...
Gamaredon_Group.md
40c14a533669-6
Gamaredon Group tools can delete files used during an operation.(Citation: TrendMicro Gamaredon April 2020)(Citation: Symantec Shuckworm January 2022)(Citation: CERT-EE Gamaredon January 2021)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1120|Peripheral Device Discovery| Gamaredon Group tools have contained a...
Gamaredon_Group.md
40c14a533669-7
Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file.(Citation: Palo Alto Gamaredon Feb 2017)(Citation: ESET Gamaredon June 2020)(Citation: CERT-EE Gamaredon January 2021)(Citation: Unit 42 Gamaredon Febru...
Gamaredon_Group.md
b59967d7b702-0
GCMAN - G0036 Created: 2017-05-31T21:32:05.611Z Modified: 2020-03-30T19:03:44.853Z Contributors: Aliases GCMAN Description GCMAN is a threat group that focuses on targeting banks for the purpose of transferring money to e-currency services. (Citation: Securelist GCMAN) Techniques Used |Matrix|Domain|Platform|T...
GCMAN.md
ece684920986-0
GOLD SOUTHFIELD - G0115 Created: 2020-09-22T19:41:27.845Z Modified: 2023-03-28T20:49:53.223Z Contributors: Thijn Bukkems, Amazon Aliases GOLD SOUTHFIELD,Pinchy Spider Description GOLD SOUTHFIELD is a financially motivated threat group active since at least 2018 that operates the REvil Ransomware-as-a Service (Ra...
GOLD_SOUTHFIELD.md
ece684920986-1
GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR.(Citation: Secureworks REvil September 2019)(Citation: Secureworks GandCrab and REvil September 2019)(Citation: Secureworks GOLD SOUTHFIELD)| |mitre-attack|enterprise-attack,ic...
GOLD_SOUTHFIELD.md
cfd977948772-0
Gorgon Group - G0078 Created: 2018-10-17T00:14:20.652Z Modified: 2021-10-12T21:57:25.847Z Contributors: Aliases Gorgon Group Description Gorgon Group is a threat group consisting of members who are suspected to be Pakistan-based or have other connections to Pakistan. The group has performed a mix of criminal and...
Gorgon_Group.md
cfd977948772-1
ShiftyBug, and inject into another process.(Citation: Unit 42 Gorgon Group Aug 2018)| |mitre-attack|enterprise-attack|Windows|T1055.012|Process Hollowing| Gorgon Group malware can use process hollowing to inject one of its trojans into another process.(Citation: Unit 42 Gorgon Group Aug 2018)| |mitre-attack|enterprise...
Gorgon_Group.md
cfd977948772-2
Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence.(Citation: Unit 42 Gorgon Group Aug 2018)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1106|Native API| Gorgon Group malware can leverage the Windows API call, CreateProcessA(), for execution.(Citation: Unit 42 Gor...
Gorgon_Group.md
5daefd89c141-0
Group5 - G0043 Created: 2017-05-31T21:32:08.304Z Modified: 2020-03-30T19:07:39.812Z Contributors: Aliases Group5 Description Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing an...
Group5.md
ae4b646b8d48-0
HAFNIUM - G0125 Created: 2021-03-03T19:40:47.280Z Modified: 2023-04-10T21:54:46.756Z Contributors: Daniyal Naeem, BT Security,Matt Brenton, Zurich Insurance Group,Mayuresh Dani, Qualys,Harshal Tupsamudre, Qualys,Vinayak Wadhwa, SAFE Security Aliases HAFNIUM,Operation Exchange Marauder Description HAFNIUM is a li...
HAFNIUM.md
ae4b646b8d48-1
HAFNIUM has checked for network connectivity from a compromised host using HAFNIUM has used HAFNIUM has used HAFNIUM has enumerated domain controllers using HAFNIUM has granted privileges to domain accounts.(Citation: Volexity Exchange Marauder March 2021)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows ...
HAFNIUM.md
ae4b646b8d48-2
HAFNIUM has created domain accounts.(Citation: Volexity Exchange Marauder March 2021)| |mitre-attack|enterprise-attack|PRE|T1590|Gather Victim Network Information| HAFNIUM gathered the fully qualified domain names (FQDNs) for targeted Exchange servers in the victim's environment.(Citation: Volexity Exchange Marauder M...
HAFNIUM.md
ae4b646b8d48-3
HAFNIUM has used HAFNIUM has deployed multiple web shells on compromised servers including SIMPLESEESHARP, SPORTSBALL, China Chopper, and ASPXSpy.(Citation: Microsoft HAFNIUM March 2020)(Citation: Volexity Exchange Marauder March 2021)(Citation: FireEye Exchange Zero Days March 2021)(Citation: Tarrask scheduled task...
HAFNIUM.md
ae4b646b8d48-4
HAFNIUM has exploited CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 to compromise on-premises versions of Microsoft Exchange Server, enabling access to email accounts and installation of additional malware.(Citation: Microsoft HAFNIUM March 2020)(Citation: Volexity Exchange Marauder March 2021)(Ci...
HAFNIUM.md
ae40915e7d43-0
HEXANE - G1001 Created: 2018-10-17T00:14:20.652Z Modified: 2023-03-22T04:43:59.082Z Contributors: Dragos Threat Intelligence,Mindaugas Gudzis, BT Security Aliases HEXANE,Lyceum,Siamesekitten,Spirlin Description HEXANE is a cyber espionage threat group that has targeted oil & gas, telecommunications, aviation, an...
HEXANE.md
ae40915e7d43-1
HEXANE has downloaded additional payloads and malicious scripts onto a compromised host.(Citation: Kaspersky Lyceum October 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1102.002|Bidirectional Communication| HEXANE has used cloud services, including OneDrive, for C2.(Citation: Microsoft POLONI...
HEXANE.md
ae40915e7d43-2
HEXANE has used a VisualBasic script named HEXANE has used a Mimikatz-based tool and a PowerShell script to steal passwords from Google Chrome.(Citation: Kaspersky Lyceum October 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| HEXANE has enumerated processes on ...
HEXANE.md
ae40915e7d43-3
HEXANE has identified specific potential victims at targeted organizations.(Citation: ClearSky Siamesekitten August 2021)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1591.004|Identify Roles| HEXANE has identified executives, HR, and IT staff at victim organizations for further targeting.(Citation: SecureWorks Aug...
HEXANE.md
ae40915e7d43-4
HEXANE has relied on victim's executing malicious file attachments delivered via email or embedded within actor-controlled websites to deliver malware.(Citation: SecureWorks August 2019)(Citation: Dragos Hexane)(Citation: ClearSky Siamesekitten August 2021)(Citation: Zscaler Lyceum DnsSystem June 2022)| |mitre-attack|e...
HEXANE.md
1d3af94e958c-0
Higaisa - G0126 Created: 2021-03-05T18:54:56.267Z Modified: 2021-04-22T02:12:43.892Z Contributors: Daniyal Naeem, BT Security Aliases Higaisa Description Higaisa is a threat group suspected to have South Korean origins. Higaisa has targeted government, public, and trade organizations in North Korea; however, the...
Higaisa.md
1d3af94e958c-1
Higaisa collected the system volume serial number, GUID, and computer name.(Citation: PTSecurity Higaisa 2020)(Citation: Malwarebytes Higaisa 2020)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| Higaisa has exploited CVE-2018-0798 for execution.(Citation: PTSecurity Higai...
Higaisa.md
1d3af94e958c-2
Higaisa named a shellcode loader binary Higaisa used certutil to decode Base64 binaries at runtime and a 16-byte XOR key to decrypt data.(Citation: Malwarebytes Higaisa 2020)(Citation: Zscaler Higaisa 2020)| |mitre-attack|enterprise-attack|Windows|T1220|XSL Script Processing| Higaisa used an XSL file to run VBScript ...
Higaisa.md
1d3af94e958c-3
Higaisa used Higaisa exfiltrated data over its C2 channel.(Citation: Zscaler Higaisa 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.001|Binary Padding| Higaisa performed padding with null bytes before calculating its hash.(Citation: Zscaler Higaisa 2020)|
Higaisa.md
72885bec5ed4-0
Inception - G0100 Created: 2020-05-08T17:01:04.058Z Modified: 2021-10-12T23:21:06.480Z Contributors: Oleg Skulkin, Group-IB Aliases Inception,Inception Framework,Cloud Atlas Description Inception is a cyber espionage group active since at least 2014. The group has targeted multiple industries and governmental en...
Inception.md
72885bec5ed4-1
Inception has used VBScript to execute malicious commands and payloads.(Citation: Unit 42 Inception November 2018)(Citation: Kaspersky Cloud Atlas December 2014)| |mitre-attack|enterprise-attack|Windows|T1221|Template Injection| Inception has used decoy documents to load malicious remote payloads via HTTP.(Citation: U...
Inception.md
72885bec5ed4-2
Inception used a browser plugin to steal passwords and sessions from Internet Explorer, Chrome, Opera, Firefox, Torch, and Yandex.(Citation: Symantec Inception Framework March 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| Inception lured victims into clicking malicious files for ...
Inception.md
72885bec5ed4-3
Inception has used a reconnaissance module to gather information about the operating system and hardware on the infected host.(Citation: Symantec Inception Framework March 2018)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Inception has used weaponized documents attached to ...
Inception.md
68e0df3c7c24-0
IndigoZebra - G0136 Created: 2021-09-24T21:41:34.797Z Modified: 2021-10-16T02:06:06.404Z Contributors: Pooja Natarajan, NEC Corporation India,Yoshihiro Kori, NEC Corporation,Manikantan Srinivasan, NEC Corporation India Aliases IndigoZebra Description IndigoZebra is a suspected Chinese cyber espionage group that ...
IndigoZebra.md
68e0df3c7c24-1
IndigoZebra sent spearphishing emails containing malicious password-protected RAR attachments.(Citation: HackerNews IndigoZebra July 2021)(Citation: Checkpoint IndigoZebra July 2021)| |mitre-attack|enterprise-attack|PRE|T1583.006|Web Services| IndigoZebra created Dropbox accounts for their operations.(Citation: Hacker...
IndigoZebra.md
38ae47e5f08e-0
Indrik Spider - G0119 Created: 2021-01-06T17:46:35.134Z Modified: 2022-09-15T19:49:18.799Z Contributors: Aliases Indrik Spider,Evil Corp Description Indrik Spider is a Russia-based cybercriminal group that has been active since at least 2014. Indrik Spider initially started with the Dridex banking Trojan, and th...
Indrik_Spider.md
38ae47e5f08e-1
Indrik Spider has used malicious JavaScript files for several components of their attack.(Citation: Symantec WastedLocker June 2020)| |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.(Citation: Symantec WastedLocker June 20...
Indrik_Spider.md
38ae47e5f08e-2
Indrik Spider has downloaded additional scripts, malware, and tools onto a compromised host.(Citation: Crowdstrike Indrik November 2018)(Citation: Symantec WastedLocker June 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| Indrik Spider used fake update...
Indrik_Spider.md
470224a432c1-0
Ke3chang - G0004 Created: 2017-05-31T21:31:47.177Z Modified: 2022-07-22T18:52:32.762Z Contributors: Pooja Natarajan, NEC Corporation India,Manikantan Srinivasan, NEC Corporation India,Hiroki Nagahama, NEC Corporation Aliases Ke3chang,APT15,Mirage,Vixen Panda,GREF,Playful Dragon,RoyalAPT,NICKEL Description Ke3cha...
Ke3chang.md
470224a432c1-1
Ke3chang has performed frequent and scheduled data collection from victim networks.(Citation: Microsoft NICKEL December 2021)| |mitre-attack|enterprise-attack|Windows|T1003.003|NTDS| Ke3chang has used NTDSDump and other password dumping tools to gather credentials.(Citation: Microsoft NICKEL December 2021)| |mitre-att...
Ke3chang.md
470224a432c1-2
Ke3chang has developed custom malware that allowed them to maintain persistence on victim networks.(Citation: Microsoft NICKEL December 2021)| |mitre-attack|enterprise-attack|PRE|T1588.002|Tool| Ke3chang has obtained and used tools such as Mimikatz.(Citation: NCC Group APT15 Alive and Strong)| |mitre-attack|enterpris...
Ke3chang.md
470224a432c1-3
Ping.(Citation: NCC Group APT15 Alive and Strong)| |mitre-attack|enterprise-attack|Windows,Office 365|T1213.002|Sharepoint| Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember.(Citation: NCC Group APT15 Alive and Strong)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web P...
Ke3chang.md
470224a432c1-4
Ke3chang has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.(Citation: NCC Group APT15 Alive and Strong)(Citation: Microsoft NICKEL December 2021)| |mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| Ke3chang has gained access thro...
Ke3chang.md
470224a432c1-5
Ke3chang performs operating system information discovery using Ke3chang performs discovery of permission groups Ke3chang has performed local network configuration discovery using Ke3chang performs local network connection discovery using Ke3chang performs process discovery using Ke3chang uses command-line interact...
Ke3chang.md
78b07f7c632e-0
Kimsuky - G0094 Created: 2019-08-26T15:03:02.577Z Modified: 2022-11-30T22:53:00.875Z Contributors: Taewoo Lee, KISA,Dongwook Kim, KISA Aliases Kimsuky,STOLEN PENCIL,Thallium,Black Banshee,Velvet Chollima Description Kimsuky is a North Korea-based cyber espionage group that has been active since at least 2012. Th...
Kimsuky.md
78b07f7c632e-1
Kimsuky has exfiltrated stolen files and data to actor-controlled Blogspot accounts.(Citation: Talos Kimsuky Nov 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.002|Bidirectional Communication| Kimsuky has used Blogspot pages for C2.(Citation: Talos Kimsuky Nov 2021)| |mitre-attack|enterprise-attack|W...
Kimsuky.md
78b07f7c632e-2
Kimsuky has collected victim organization information including but not limited to organization hierarchy, functions, press releases, and others.(Citation: KISA Operation Muzabi)| |mitre-attack|enterprise-attack|PRE|T1594|Search Victim-Owned Websites| Kimsuky has searched for information on the target company's websit...
Kimsuky.md
78b07f7c632e-3
Kimsuky has exploited various vulnerabilities for initial access, including Microsoft Exchange vulnerability CVE-2020-0688.(Citation: KISA Operation Muzabi)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Kimsuky has executed Windows commands by using Kimsuky has used Kimsuky has used a fil...
Kimsuky.md
78b07f7c632e-4
Kimsuky has decoded malicious VBScripts using Base64.(Citation: Talos Kimsuky Nov 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560.001|Archive via Utility| Kimsuky has used QuickZip to archive stolen files before exfiltration.(Citation: Talos Kimsuky Nov 2021)| |mitre-attack|enterprise-attack|Windows,m...
Kimsuky.md
78b07f7c632e-5
Kimsuky has used RDP for direct remote point-and-click access.(Citation: Netscout Stolen Pencil Dec 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1078.003|Local Accounts| Kimsuky has used a tool called GREASE to add a Windows admin account in order to allow them continued access via RDP.(Citat...
Kimsuky.md
78b07f7c632e-6
Kimsuky has used e-mail to send exfiltrated data to C2 servers.(Citation: CISA AA20-301A Kimsuky)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1059.006|Python| Kimsuky has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data.(Citation: CISA AA20-301A Ki...
Kimsuky.md
78b07f7c632e-7
Kimsuky has modified Registry settings for default file associations to enable all macros and for persistence.(Citation: CISA AA20-301A Kimsuky)(Citation: Crowdstrike GTR2020 Mar 2020)(Citation: Talos Kimsuky Nov 2021)(Citation: KISA Operation Muzabi)| |mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T113...
Kimsuky.md
78b07f7c632e-8
Kimsuky created and used a mailing toolkit to use in spearphishing attacks.(Citation: VirusBulletin Kimsuky October 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| Kimsuky has obfuscated binary strings including the use of XOR encryption and Base64 encoding.(Citation: ...
Kimsuky.md
78b07f7c632e-9
Kimsuky has signed files with the name EGIS CO,. Ltd..(Citation: ThreatConnect Kimsuky September 2020)| |mitre-attack|enterprise-attack|PRE|T1583.001|Domains| Kimsuky has registered domains to spoof targeted organizations and trusted third parties.(Citation: ThreatConnect Kimsuky September 2020)(Citation: Zdnet Kimsuk...
Kimsuky.md
78b07f7c632e-10
Kimsuky has enumerated drives, OS type, OS version, and other information using a script or the "systeminfo" command.(Citation: Securelist Kimsuky Sept 2013)(Citation: Talos Kimsuky Nov 2021)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Containers,IaaS|T1562.001|Disable or Modify Tools| Kimsuky has been observ...
Kimsuky.md
78b07f7c632e-11
Kimsuky has executed a variety of PowerShell scripts.(Citation: EST Kimsuky April 2019)(Citation: CISA AA20-301A Kimsuky)(Citation: Talos Kimsuky Nov 2021)(Citation: KISA Operation Muzabi)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1555.003|Credentials from Web Browsers| Kimsuky has used browser extensions ...
Kimsuky.md
78b07f7c632e-12
Kimsuky has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes.(Citation: EST Kimsuky April 2019)(Citation: Securelist Kimsuky Sept 2013)(Citation: CISA AA20-301A Kimsuky)(Citation: Netscout Stolen Pencil Dec 2018)(Citation: Talos Kimsuky Nov 2021)(Citation: KISA Operation Muzabi)| ...
Kimsuky.md
686d0984e5e0-0
LAPSUS$ - G1004 Created: 2022-06-09T19:14:31.327Z Modified: 2023-04-11T00:01:29.232Z Contributors: David Hughes, BT Security,Matt Brenton, Zurich Insurance Group,Flavio Costa, Cisco Aliases LAPSUS$,DEV-0537 Description LAPSUS$ is cyber criminal threat group that has been active since at least mid-2021. LAPSUS$ s...
LAPSUS$.md
686d0984e5e0-1
LAPSUS$ acquired and used the Redline password stealer in their operations.(Citation: MSTIC DEV-0537 Mar 2022)| |mitre-attack|enterprise-attack|PRE|T1589.002|Email Addresses| LAPSUS$ has gathered employee email addresses, including personal accounts, for social engineering and initial access efforts.(Citation: MSTIC D...
LAPSUS$.md
686d0984e5e0-2
LAPSUS$ has added the global admin role to accounts they have created in the targeted organization's cloud instances.(Citation: MSTIC DEV-0537 Mar 2022)| |mitre-attack|enterprise-attack|Azure AD,Office 365,IaaS,Google Workspace,SaaS|T1136.003|Cloud Account| LAPSUS$ has created global admin accounts in the targeted org...
LAPSUS$.md
686d0984e5e0-3
LAPSUS$ has recruited target organization employees or contractors who provide credentials and approve an associated MFA prompt, or install remote management software onto a corporate workstation, allowing LAPSUS$ to take control of an authenticated system.(Citation: MSTIC DEV-0537 Mar 2022)| |mitre-attack|enterprise-...
LAPSUS$.md
686d0984e5e0-4
LAPSUS$ has searched a victim's network for collaboration platforms like SharePoint to discover further high-privilege account credentials.(Citation: MSTIC DEV-0537 Mar 2022)| |mitre-attack|enterprise-attack|SaaS|T1213.001|Confluence| LAPSUS$ has searched a victim's network for collaboration platforms like Confluence ...
LAPSUS$.md
686d0984e5e0-5
LAPSUS$ has searched public code repositories for exposed credentials.(Citation: MSTIC DEV-0537 Mar 2022)| |mitre-attack|enterprise-attack|PRE|T1597.002|Purchase Technical Data| LAPSUS$ has purchased credentials and session tokens from criminal underground forums.(Citation: MSTIC DEV-0537 Mar 2022)| |mitre-attack|ente...
LAPSUS$.md
09890f2fe314-0
Lazarus Group - G0032 Created: 2017-05-31T21:32:03.807Z Modified: 2023-03-30T19:01:41.451Z Contributors: Kyaw Pyiyt Htet, @KyawPyiytHtet,Dragos Threat Intelligence Aliases Lazarus Group,Labyrinth Chollima,HIDDEN COBRA,Guardians of Peace,ZINC,NICKEL ACADEMY Description Lazarus Group is a North Korean state-spon...
Lazarus_Group.md
09890f2fe314-1
Lazarus Group has changed memory protection permissions then overwritten in memory DLL function code with shellcode, which was later executed via KernelCallbackTable hijacking. Lazarus Group has also used shellcode within macros to decrypt and manually map DLLs into memory at runtime.(Citation: Lazarus APT January 20...
Lazarus_Group.md
09890f2fe314-2
Lazarus Group has created new Twitter accounts to conduct social engineering against potential victims.(Citation: Google TAG Lazarus Jan 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1566.003|Spearphishing via Service| Lazarus Group has used social media platforms, including LinkedIn and Twitt...
Lazarus_Group.md
09890f2fe314-3
Lazarus Group has digitally signed malware and utilities to evade detection.(Citation: Lazarus APT January 2022)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1557.001|LLMNR/NBT-NS Poisoning and SMB Relay| Lazarus Group executed Responder using the command Lazarus Group has sent malicious links to victims via...
Lazarus_Group.md
09890f2fe314-4
Lazarus Group has used the Windows API Lazarus Group has also used various, often lesser known, functions to perform various types of Discovery and Process Injection.(Citation: Lazarus APT January 2022)(Citation: Qualys LolZarus)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS|T1021.004|SSH| Lazarus Group us...
Lazarus_Group.md
09890f2fe314-5
Lazarus Group malware uses a list of ordered port numbers to choose a port for C2 traffic, creating port-protocol mismatches.(Citation: Novetta Blockbuster)(Citation: Novetta Blockbuster RATs)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1560.003|Archive via Custom Method|A Lazarus Group malware sa...
Lazarus_Group.md
09890f2fe314-6
Lazarus Group malware uses cmd.exe to execute commands on a compromised host.(Citation: Novetta Blockbuster)(Citation: Novetta Blockbuster Destructive Malware)(Citation: McAfee Lazarus Resurfaces Feb 2018)(Citation: US-CERT SHARPKNOT June 2018)(Citation: Qualys LolZarus) A Destover-like variant used by Lazarus Group u...
Lazarus_Group.md
09890f2fe314-7
Lazarus Group malware SHARPKNOT overwrites and deletes the Master Boot Record (MBR) on the victim's machine and has possessed MBR wiper malware since at least 2009.(Citation: US-CERT SHARPKNOT June 2018)(Citation: Novetta Blockbuster)| |mitre-attack|enterprise-attack,ics-attack|Windows,Linux,macOS|T1489|Service Stop| ...
Lazarus_Group.md
09890f2fe314-8
Lazarus Group delivered RATANKBA and other malicious code to victims via a compromised legitimate website.(Citation: RATANKBA)(Citation: Google TAG Lazarus Jan 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1132.001|Standard Encoding|A Lazarus Group malware sample encodes data with base64.(Cit...
Lazarus_Group.md