id stringlengths 14 15 | text stringlengths 96 2.14k | source stringlengths 6 21 |
|---|---|---|
0ec9e27477c7-2 | Turla has used legitimate web services including Pastebin, Dropbox, and GitHub for C2 communications.(Citation: Accenture HyperStack October 2020)(Citation: ESET Crutch December 2020)|
|mitre-attack|enterprise-attack|PRE|T1587.001|Malware|
Turla has developed its own unique malware for use in operations.(Citation: Rec... | Turla.md |
0ec9e27477c7-3 | Turla has infected victims using watering holes.(Citation: ESET ComRAT May 2020)(Citation: Secureworks IRON HUNTER Profile)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS,SaaS,Office 365,Google Workspace,IaaS|T1213|Data from Information Repositories|
Turla has used a custom .NET tool to collect documents from an... | Turla.md |
0ec9e27477c7-4 | Turla has used VBS scripts throughout its operations.(Citation: Symantec Waterbug Jun 2019) |
|mitre-attack|enterprise-attack|Windows|T1555.004|Windows Credential Manager|
Turla has gathered credentials from the Windows Credential Manager tool.(Citation: Symantec Waterbug Jun 2019) |
|mitre-attack|enterprise-attack... | Turla.md |
0ec9e27477c7-5 | Turla has used a AMSI bypass, which patches the in-memory amsi.dll, in PowerShell scripts to bypass Windows antimalware products.(Citation: ESET Turla PowerShell May 2019)|
|mitre-attack|enterprise-attack|Windows,macOS,Linux|T1106|Native API|
Turla and its RPC backdoors have used APIs calls for various tasks related t... | Turla.md |
0ec9e27477c7-6 | Turla has also used PowerShell scripts to load and execute malware in memory.|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols|
Turla has used HTTP and HTTPS for C2 communications.(Citation: ESET Turla Mosquito Jan 2018)(Citation: ESET Turla Mosquito May 2018)|
|mitre-attack|enterprise-atta... | Turla.md |
0ec9e27477c7-7 | Turla JavaScript backdoor has used Google Apps Script as its C2 server.(Citation: ESET Turla Mosquito Jan 2018)(Citation: ESET Turla Mosquito May 2018)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.005|Indicator Removal from Tools|Based on comparison of
Gazer versions,
Turla made an effort to obfuscate s... | Turla.md |
0ec9e27477c7-8 | Turla used
Turla surveys a system upon check-in to discover running services and associated processes using the
Turla surveys a system upon check-in to discover running processes using the
Turla RPC backdoors have also enumerated processes associated with specific open ports or named pipes.(Citation: ESET Turla Powe... | Turla.md |
6dc18f389b60-0 | Volatile Cedar - G0123
Created: 2021-02-08T20:30:30.578Z
Modified: 2022-04-20T20:08:15.870Z
Contributors:
Aliases
Volatile Cedar,Lebanese Cedar
Description
Volatile Cedar is a Lebanese threat group that has targeted individuals, companies, and institutions worldwide. Volatile Cedar has been operating since 2012 ... | Volatile_Cedar.md |
eed8d5cbe25f-0 | Whitefly - G0107
Created: 2020-05-26T16:55:09.674Z
Modified: 2021-10-12T21:43:24.133Z
Contributors:
Aliases
Whitefly
Description
Whitefly is a cyber espionage group that has been operating since at least 2017. The group has targeted organizations based mostly in Singapore across a wide variety of sectors, and is... | Whitefly.md |
eed8d5cbe25f-1 | Whitefly has used malicious .exe or .dll files disguised as documents or images.(Citation: Symantec Whitefly March 2019)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation|
Whitefly has used an open-source tool to exploit a known Windows privilege escalation vul... | Whitefly.md |
03f55572da64-0 | Windigo - G0124
Created: 2021-02-10T19:57:38.042Z
Modified: 2021-04-26T22:32:57.046Z
Contributors:
Aliases
Windigo
Description
The Windigo group has been operating since at least 2011, compromising thousands of Linux and Unix servers using the Ebury SSH backdoor to create a spam botnet. Despite law enforcement i... | Windigo.md |
03f55572da64-1 | Windigo has distributed Windows malware via drive-by downloads.(Citation: ESET Windigo Mar 2014)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1090|Proxy|
Windigo has delivered a generic Windows proxy Win32/Glubteta.M.
Windigo has also used multiple reverse proxy chains as part of their C2 infrastruct... | Windigo.md |
5c3c4e3c22b9-0 | Windshift - G0112
Created: 2020-06-25T17:16:39.168Z
Modified: 2021-04-26T14:37:33.234Z
Contributors:
Aliases
Windshift,Bahamut
Description
Windshift is a threat group that has been active since at least 2017, targeting specific individuals for surveillance in government departments and critical infrastructure ac... | Windshift.md |
5c3c4e3c22b9-1 | Windshift has used malware to identify installed software.(Citation: BlackBerry Bahamut)|
|mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|
Windshift has used tools to deploy additional payloads to compromised hosts.(Citation: BlackBerry Bahamut)|
|mitre-attack|enterprise-a... | Windshift.md |
5c3c4e3c22b9-2 | Windshift has used revoked certificates to sign malware.(Citation: objective-see windtail1 dec 2018)(Citation: SANS Windshift August 2018)|
|mitre-attack|enterprise-attack,mobile-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment|
Windshift has sent spearphishing emails with attachment to harvest credential... | Windshift.md |
5c3c4e3c22b9-3 | Windshift has included video recording in the malicious apps deployed as part of Operation BULL.(Citation: BlackBerry Bahamut)|
|mitre-attack|enterprise-attack,mobile-attack|Android,iOS|T1407|Download New Code at Runtime|
Windshift has included malware functionality capable of downloading new DEX files at runtime duri... | Windshift.md |
5c3c4e3c22b9-4 | Windshift has included file enumeration in the malicious apps deployed as part of Operation BULL and Operation ROCK.(Citation: BlackBerry Bahamut)|
|mitre-attack|enterprise-attack,mobile-attack|Android,iOS|T1430|Location Tracking|
Windshift has included location tracking capabilities in the malicious apps deployed as ... | Windshift.md |
f867bb53f607-0 | Winnti Group - G0044
Created: 2017-05-31T21:32:08.682Z
Modified: 2023-03-20T22:02:53.982Z
Contributors: Edward Millington
Aliases
Winnti Group,Blackfly
Description
Winnti Group is a threat group with Chinese origins that has been active since at least 2010. The group has heavily targeted the gaming industry, but... | Winnti_Group.md |
f867bb53f607-1 | Winnti Group looked for a specific process running on infected servers.(Citation: Kaspersky Winnti April 2013)| | Winnti_Group.md |
731043f9db50-0 | WIRTE - G0090
Created: 2019-05-24T17:02:44.226Z
Modified: 2022-04-15T19:50:19.478Z
Contributors: Lab52 by S2 Grupo
Aliases
WIRTE
Description
WIRTE is a threat group that has been active since at least August 2018. WIRTE has targeted government, diplomatic, financial, military, legal, and technology organizations... | WIRTE.md |
731043f9db50-1 | WIRTE has used
WIRTE has downloaded PowerShell code from the C2 server to be executed.(Citation: Lab52 WIRTE Apr 2019)|
|mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell|
WIRTE has used PowerShell for script execution.(Citation: Lab52 WIRTE Apr 2019)|
|mitre-attack|enterprise-attack|Windows,macOS,Linux|T10... | WIRTE.md |
68da1946ba10-0 | Wizard Spider - G0102
Created: 2020-05-12T18:15:29.396Z
Modified: 2023-03-22T05:44:27.289Z
Contributors: Edward Millington,Oleksiy Gayda
Aliases
Wizard Spider,UNC1878,TEMP.MixMaster,Grim Spider
Description
Wizard Spider is a Russia-based financially motivated threat group originally known for the creation and de... | Wizard_Spider.md |
68da1946ba10-1 | Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware.(Citation: DFIR Ryuk 2 Hour Speed Run November 2020)|
|mitre-attack|enterprise-attack,ics-attack|macOS,Windows|T1553.002|Code Signing|
Wizard Spider has used Digicert code-signing certificates for some of its malware.(Citation... | Wizard_Spider.md |
68da1946ba10-2 | Wizard Spider has used the Invoke-Inveigh PowerShell cmdlets, likely for name service poisoning.(Citation: FireEye KEGTAP SINGLEMALT October 2020)|
|mitre-attack|enterprise-attack,ics-attack|Windows|T1569.002|Service Execution|
Wizard Spider has used services.exe to execute scripts and executables during lateral movem... | Wizard_Spider.md |
68da1946ba10-3 | Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.(Citation: DFIR Ryuk's Return October 2020)|
|mitre-attack|enterprise-attack,ics-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services|
Wizard Spider has accessed victim network... | Wizard_Spider.md |
68da1946ba10-4 | Wizard Spider has used the “net view” command to locate mapped network shares.(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)|
|mitre-attack|enterprise-attack,ics-attack|Windows|T1021.006|Windows Remote Management|
Wizard Spider has used Window Remote Management to move laterally through a victim net... | Wizard_Spider.md |
68da1946ba10-5 | Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)(Citation: DFIR Ryuk 2 Hour Speed Run November 2020)|
|mitre-attack|enterprise-attack,ics-attack|Windows|T1047|Windows Management Instrumentation|
Wizard Spid... | Wizard_Spider.md |
68da1946ba10-6 | TrickBot modules.(Citation: CrowdStrike Grim Spider May 2019)|
|mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1071.001|Web Protocols|
Wizard Spider has used HTTP for network communications.(Citation: CrowdStrike Grim Spider May 2019)|
|mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T104... | Wizard_Spider.md |
68da1946ba10-7 | Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines.(Citation: CrowdStrike Grim Spider May 2019) It has also used PowerShell to execute commands and move laterally through a victim network.(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)(Citation: FireEy... | Wizard_Spider.md |
68da1946ba10-8 | Wizard Spider has modified the Registry key
Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either
Emotet, Bokbot,
TrickBot, or
Bazar.(Citation: CrowdStrike Grim Spider May 2019)(Citation: Red Canary Hospital Thwarted R... | Wizard_Spider.md |
cd4c4a6bba64-0 | ZIRCONIUM - G0128
Created: 2021-03-24T15:48:17.731Z
Modified: 2023-03-22T22:10:43.732Z
Contributors:
Aliases
ZIRCONIUM,APT31
Description
ZIRCONIUM is a threat group operating out of China, active since at least 2017, that has targeted individuals associated with the 2020 US presidential election and prominent le... | ZIRCONIUM.md |
cd4c4a6bba64-1 | ZIRCONIUM has used multi-stage packers for exploit code.(Citation: Check Point APT31 February 2021)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|
ZIRCONIUM has used tools to download malicious files to compromised hosts.(Citation: Zscaler APT31 Covid-19 October 2020)|
|mitre-attack|... | ZIRCONIUM.md |
cd4c4a6bba64-2 | ZIRCONIUM has used a tool to capture the time on a compromised host in order to register it with C2.(Citation: Zscaler APT31 Covid-19 October 2020)|
|mitre-attack|enterprise-attack|Windows|T1012|Query Registry|
ZIRCONIUM has used a tool to query the Registry for proxy settings.(Citation: Zscaler APT31 Covid-19 October... | ZIRCONIUM.md |
cd4c4a6bba64-3 | ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.(Citation: Google Election Threats October 2020)(Citation: Zscaler APT31 Covid-19 October 2020)|
|mitre-attack|enterprise-attack|PRE|T1598|Phishing for Information|
ZIRCONIUM targeted presidential campaig... | ZIRCONIUM.md |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.