id
stringlengths
14
15
text
stringlengths
96
2.14k
source
stringlengths
6
21
0ec9e27477c7-2
Turla has used legitimate web services including Pastebin, Dropbox, and GitHub for C2 communications.(Citation: Accenture HyperStack October 2020)(Citation: ESET Crutch December 2020)| |mitre-attack|enterprise-attack|PRE|T1587.001|Malware| Turla has developed its own unique malware for use in operations.(Citation: Rec...
Turla.md
0ec9e27477c7-3
Turla has infected victims using watering holes.(Citation: ESET ComRAT May 2020)(Citation: Secureworks IRON HUNTER Profile)| |mitre-attack|enterprise-attack|Linux,Windows,macOS,SaaS,Office 365,Google Workspace,IaaS|T1213|Data from Information Repositories| Turla has used a custom .NET tool to collect documents from an...
Turla.md
0ec9e27477c7-4
Turla has used VBS scripts throughout its operations.(Citation: Symantec Waterbug Jun 2019) | |mitre-attack|enterprise-attack|Windows|T1555.004|Windows Credential Manager| Turla has gathered credentials from the Windows Credential Manager tool.(Citation: Symantec Waterbug Jun 2019) | |mitre-attack|enterprise-attack...
Turla.md
0ec9e27477c7-5
Turla has used a AMSI bypass, which patches the in-memory amsi.dll, in PowerShell scripts to bypass Windows antimalware products.(Citation: ESET Turla PowerShell May 2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1106|Native API| Turla and its RPC backdoors have used APIs calls for various tasks related t...
Turla.md
0ec9e27477c7-6
Turla has also used PowerShell scripts to load and execute malware in memory.| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| Turla has used HTTP and HTTPS for C2 communications.(Citation: ESET Turla Mosquito Jan 2018)(Citation: ESET Turla Mosquito May 2018)| |mitre-attack|enterprise-atta...
Turla.md
0ec9e27477c7-7
Turla JavaScript backdoor has used Google Apps Script as its C2 server.(Citation: ESET Turla Mosquito Jan 2018)(Citation: ESET Turla Mosquito May 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.005|Indicator Removal from Tools|Based on comparison of Gazer versions, Turla made an effort to obfuscate s...
Turla.md
0ec9e27477c7-8
Turla used Turla surveys a system upon check-in to discover running services and associated processes using the Turla surveys a system upon check-in to discover running processes using the Turla RPC backdoors have also enumerated processes associated with specific open ports or named pipes.(Citation: ESET Turla Powe...
Turla.md
6dc18f389b60-0
Volatile Cedar - G0123 Created: 2021-02-08T20:30:30.578Z Modified: 2022-04-20T20:08:15.870Z Contributors: Aliases Volatile Cedar,Lebanese Cedar Description Volatile Cedar is a Lebanese threat group that has targeted individuals, companies, and institutions worldwide. Volatile Cedar has been operating since 2012 ...
Volatile_Cedar.md
eed8d5cbe25f-0
Whitefly - G0107 Created: 2020-05-26T16:55:09.674Z Modified: 2021-10-12T21:43:24.133Z Contributors: Aliases Whitefly Description Whitefly is a cyber espionage group that has been operating since at least 2017. The group has targeted organizations based mostly in Singapore across a wide variety of sectors, and is...
Whitefly.md
eed8d5cbe25f-1
Whitefly has used malicious .exe or .dll files disguised as documents or images.(Citation: Symantec Whitefly March 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation| Whitefly has used an open-source tool to exploit a known Windows privilege escalation vul...
Whitefly.md
03f55572da64-0
Windigo - G0124 Created: 2021-02-10T19:57:38.042Z Modified: 2021-04-26T22:32:57.046Z Contributors: Aliases Windigo Description The Windigo group has been operating since at least 2011, compromising thousands of Linux and Unix servers using the Ebury SSH backdoor to create a spam botnet. Despite law enforcement i...
Windigo.md
03f55572da64-1
Windigo has distributed Windows malware via drive-by downloads.(Citation: ESET Windigo Mar 2014)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1090|Proxy| Windigo has delivered a generic Windows proxy Win32/Glubteta.M. Windigo has also used multiple reverse proxy chains as part of their C2 infrastruct...
Windigo.md
5c3c4e3c22b9-0
Windshift - G0112 Created: 2020-06-25T17:16:39.168Z Modified: 2021-04-26T14:37:33.234Z Contributors: Aliases Windshift,Bahamut Description Windshift is a threat group that has been active since at least 2017, targeting specific individuals for surveillance in government departments and critical infrastructure ac...
Windshift.md
5c3c4e3c22b9-1
Windshift has used malware to identify installed software.(Citation: BlackBerry Bahamut)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| Windshift has used tools to deploy additional payloads to compromised hosts.(Citation: BlackBerry Bahamut)| |mitre-attack|enterprise-a...
Windshift.md
5c3c4e3c22b9-2
Windshift has used revoked certificates to sign malware.(Citation: objective-see windtail1 dec 2018)(Citation: SANS Windshift August 2018)| |mitre-attack|enterprise-attack,mobile-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Windshift has sent spearphishing emails with attachment to harvest credential...
Windshift.md
5c3c4e3c22b9-3
Windshift has included video recording in the malicious apps deployed as part of Operation BULL.(Citation: BlackBerry Bahamut)| |mitre-attack|enterprise-attack,mobile-attack|Android,iOS|T1407|Download New Code at Runtime| Windshift has included malware functionality capable of downloading new DEX files at runtime duri...
Windshift.md
5c3c4e3c22b9-4
Windshift has included file enumeration in the malicious apps deployed as part of Operation BULL and Operation ROCK.(Citation: BlackBerry Bahamut)| |mitre-attack|enterprise-attack,mobile-attack|Android,iOS|T1430|Location Tracking| Windshift has included location tracking capabilities in the malicious apps deployed as ...
Windshift.md
f867bb53f607-0
Winnti Group - G0044 Created: 2017-05-31T21:32:08.682Z Modified: 2023-03-20T22:02:53.982Z Contributors: Edward Millington Aliases Winnti Group,Blackfly Description Winnti Group is a threat group with Chinese origins that has been active since at least 2010. The group has heavily targeted the gaming industry, but...
Winnti_Group.md
f867bb53f607-1
Winnti Group looked for a specific process running on infected servers.(Citation: Kaspersky Winnti April 2013)|
Winnti_Group.md
731043f9db50-0
WIRTE - G0090 Created: 2019-05-24T17:02:44.226Z Modified: 2022-04-15T19:50:19.478Z Contributors: Lab52 by S2 Grupo Aliases WIRTE Description WIRTE is a threat group that has been active since at least August 2018. WIRTE has targeted government, diplomatic, financial, military, legal, and technology organizations...
WIRTE.md
731043f9db50-1
WIRTE has used WIRTE has downloaded PowerShell code from the C2 server to be executed.(Citation: Lab52 WIRTE Apr 2019)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| WIRTE has used PowerShell for script execution.(Citation: Lab52 WIRTE Apr 2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T10...
WIRTE.md
68da1946ba10-0
Wizard Spider - G0102 Created: 2020-05-12T18:15:29.396Z Modified: 2023-03-22T05:44:27.289Z Contributors: Edward Millington,Oleksiy Gayda Aliases Wizard Spider,UNC1878,TEMP.MixMaster,Grim Spider Description Wizard Spider is a Russia-based financially motivated threat group originally known for the creation and de...
Wizard_Spider.md
68da1946ba10-1
Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware.(Citation: DFIR Ryuk 2 Hour Speed Run November 2020)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows|T1553.002|Code Signing| Wizard Spider has used Digicert code-signing certificates for some of its malware.(Citation...
Wizard_Spider.md
68da1946ba10-2
Wizard Spider has used the Invoke-Inveigh PowerShell cmdlets, likely for name service poisoning.(Citation: FireEye KEGTAP SINGLEMALT October 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1569.002|Service Execution| Wizard Spider has used services.exe to execute scripts and executables during lateral movem...
Wizard_Spider.md
68da1946ba10-3
Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.(Citation: DFIR Ryuk's Return October 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| Wizard Spider has accessed victim network...
Wizard_Spider.md
68da1946ba10-4
Wizard Spider has used the “net view” command to locate mapped network shares.(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1021.006|Windows Remote Management| Wizard Spider has used Window Remote Management to move laterally through a victim net...
Wizard_Spider.md
68da1946ba10-5
Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)(Citation: DFIR Ryuk 2 Hour Speed Run November 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1047|Windows Management Instrumentation| Wizard Spid...
Wizard_Spider.md
68da1946ba10-6
TrickBot modules.(Citation: CrowdStrike Grim Spider May 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1071.001|Web Protocols| Wizard Spider has used HTTP for network communications.(Citation: CrowdStrike Grim Spider May 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T104...
Wizard_Spider.md
68da1946ba10-7
Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines.(Citation: CrowdStrike Grim Spider May 2019) It has also used PowerShell to execute commands and move laterally through a victim network.(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)(Citation: FireEy...
Wizard_Spider.md
68da1946ba10-8
Wizard Spider has modified the Registry key Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar.(Citation: CrowdStrike Grim Spider May 2019)(Citation: Red Canary Hospital Thwarted R...
Wizard_Spider.md
cd4c4a6bba64-0
ZIRCONIUM - G0128 Created: 2021-03-24T15:48:17.731Z Modified: 2023-03-22T22:10:43.732Z Contributors: Aliases ZIRCONIUM,APT31 Description ZIRCONIUM is a threat group operating out of China, active since at least 2017, that has targeted individuals associated with the 2020 US presidential election and prominent le...
ZIRCONIUM.md
cd4c4a6bba64-1
ZIRCONIUM has used multi-stage packers for exploit code.(Citation: Check Point APT31 February 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| ZIRCONIUM has used tools to download malicious files to compromised hosts.(Citation: Zscaler APT31 Covid-19 October 2020)| |mitre-attack|...
ZIRCONIUM.md
cd4c4a6bba64-2
ZIRCONIUM has used a tool to capture the time on a compromised host in order to register it with C2.(Citation: Zscaler APT31 Covid-19 October 2020)| |mitre-attack|enterprise-attack|Windows|T1012|Query Registry| ZIRCONIUM has used a tool to query the Registry for proxy settings.(Citation: Zscaler APT31 Covid-19 October...
ZIRCONIUM.md
cd4c4a6bba64-3
ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.(Citation: Google Election Threats October 2020)(Citation: Zscaler APT31 Covid-19 October 2020)| |mitre-attack|enterprise-attack|PRE|T1598|Phishing for Information| ZIRCONIUM targeted presidential campaig...
ZIRCONIUM.md