id stringlengths 14 15 | text stringlengths 96 2.14k | source stringlengths 6 21 |
|---|---|---|
4d1ab63e9fd8-0 | admin@338 - G0018
Created: 2017-05-31T21:31:53.579Z
Modified: 2020-03-18T19:54:59.120Z
Contributors: Tatsuya Daitoku, Cyber Defense Institute, Inc.
Aliases
admin@338
Description
admin@338 is a China-based cyber threat group. It has previously used newsworthy events as lures to deliver malware and has primarily t... | admin@338.md |
4d1ab63e9fd8-1 | admin@338 actors used the following command following exploitation of a machine with
LOWBALL malware to obtain information about services:
admin@338 actors used the following commands following exploitation of a machine with
LOWBALL malware to enumerate user accounts:
admin@338 actors used the following command fol... | admin@338.md |
ea46a61de809-0 | Ajax Security Team - G0130
Created: 2021-04-14T13:17:43.941Z
Modified: 2021-12-17T19:27:27.246Z
Contributors:
Aliases
Ajax Security Team,Operation Woolen-Goldfish,AjaxTM,Rocket Kitten,Flying Kitten,Operation Saffron Rose
Description
Ajax Security Team is a group that has been active since at least 2010 and belie... | Ajax_Security_Team.md |
e8998f804553-0 | ALLANITE - G1000
Created: 2017-05-31T21:31:57.307Z
Modified: 2022-05-24T19:26:10.721Z
Contributors: Dragos Threat Intelligence
Aliases
ALLANITE,Palmetto Fusion
Description
ALLANITE is a suspected Russian cyber espionage group, that has primarily targeted the electric utility sector within the United States and U... | ALLANITE.md |
2fcf3d5df109-0 | Andariel - G0138
Created: 2021-09-29T15:10:19.236Z
Modified: 2022-11-30T22:51:40.270Z
Contributors: Kyoung-ju Kwak (S2W)
Aliases
Andariel,Silent Chollima
Description
Andariel is a North Korean state-sponsored threat group that has been active since at least 2009. Andariel has primarily focused its operations--wh... | Andariel.md |
2fcf3d5df109-1 | Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.(Citation: TrendMicro New Andariel Tactics July 2018)|
|mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Ne... | Andariel.md |
2fcf3d5df109-2 | Andariel has exploited numerous ActiveX vulnerabilities, including zero-days.(Citation: FSI Andariel Campaign Rifle July 2017)(Citation: IssueMakersLab Andariel GoldenAxe May 2017)(Citation: TrendMicro New Andariel Tactics July 2018)|
|mitre-attack|enterprise-attack|PRE|T1588.001|Malware|
Andariel has used a variety o... | Andariel.md |
d5aac32d9620-0 | Aoqin Dragon - G1007
Created: 2022-07-14T14:32:47.582Z
Modified: 2022-10-24T18:50:40.179Z
Contributors: Hiroki Nagahama, NEC Corporation,Pooja Natarajan, NEC Corporation India,Manikantan Srinivasan, NEC Corporation India
Aliases
Aoqin Dragon
Description
Aoqin Dragon is a suspected Chinese cyber espionage threat ... | Aoqin_Dragon.md |
d5aac32d9620-1 | Aoqin Dragon has run scripts to identify file formats including Microsoft Word.(Citation: SentinelOne Aoqin Dragon June 2022)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution|
Aoqin Dragon has exploited CVE-2012-0158 and CVE-2010-3333 for execution against targeted systems.(... | Aoqin_Dragon.md |
3ca68da0260e-0 | APT-C-36 - G0099
Created: 2020-05-05T18:53:08.166Z
Modified: 2021-05-26T20:17:53.085Z
Contributors: Jose Luis Sánchez Martinez
Aliases
APT-C-36,Blind Eagle
Description
APT-C-36 is a suspected South America espionage group that has been active since at least 2018. The group mainly targets Colombian government ins... | APT-C-36.md |
3ca68da0260e-1 | APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload.(Citation: QiAnXin APT-C-36 Feb2019)|
|mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task|
APT-C-36 has used a macro function to set scheduled tasks, disguised as those used by Google.(Citation: QiAnXin APT-C-36 Feb2... | APT-C-36.md |
21b840153633-0 | APT1 - G0006
Created: 2017-05-31T21:31:47.955Z
Modified: 2021-05-26T12:23:48.842Z
Contributors:
Aliases
APT1,Comment Crew,Comment Group,Comment Panda
Description
APT1 is a Chinese threat group that has been attributed to the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd De... | APT1.md |
21b840153633-1 | APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.(Citation: Mandiant APT1)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1057|Process Discovery|
APT1 gathered a list of running processes on the system using
APT1... | APT1.md |
21b840153633-2 | APT1 as a name for malware.(Citation: Mandiant APT1)(Citation: Mandiant APT1 Appendix)|
|mitre-attack|enterprise-attack|Windows|T1114.001|Local Email Collection|
APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.(Citation: Mandiant APT1)|
|mitre-atta... | APT1.md |
1343ecd1650d-0 | APT12 - G0005
Created: 2017-05-31T21:31:47.537Z
Modified: 2020-03-30T18:44:59.268Z
Contributors:
Aliases
APT12,IXESHE,DynCalc,Numbered Panda,DNSCALC
Description
APT12 is a threat group that has been attributed to China. The group has targeted a variety of victims including but not limited to media outlets, high-... | APT12.md |
6f26f710f3db-0 | APT16 - G0023
Created: 2017-05-31T21:31:56.270Z
Modified: 2022-07-26T23:33:26.354Z
Contributors:
Aliases
APT16
Description
APT16 is a China-based threat group that has launched spearphishing campaigns targeting Japanese and Taiwanese organizations. (Citation: FireEye EPS Awakens Part 2)
Techniques Used
|Matrix... | APT16.md |
474f375003fe-0 | APT17 - G0025
Created: 2017-05-31T21:31:57.307Z
Modified: 2020-10-13T22:33:14.018Z
Contributors:
Aliases
APT17,Deputy Dog
Description
APT17 is a China-based threat group that has conducted network intrusions against U.S. government entities, the defense industry, law firms, information technology companies, mini... | APT17.md |
46ea6a774e7e-0 | APT18 - G0026
Created: 2017-05-31T21:31:57.733Z
Modified: 2020-03-30T18:46:16.853Z
Contributors:
Aliases
APT18,TG-0416,Dynamite Panda,Threat Group-0416
Description
APT18 is a threat group that has operated since at least 2009 and has targeted a range of industries, including technology, manufacturing, human righ... | APT18.md |
46ea6a774e7e-1 | APT18 can collect system information from the victim’s machine.(Citation: PaloAlto DNS Requests May 2016)|
|mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services|
APT18 actors leverage legitimate credentials to log into external remote services.(Citation: RSA2017 Detect and Respo... | APT18.md |
725bde59d993-0 | APT19 - G0073
Created: 2018-10-17T00:14:20.652Z
Modified: 2023-03-21T20:44:02.443Z
Contributors: FS-ISAC,Darren Spruell
Aliases
APT19,Codoso,C0d0so0,Codoso Team,Sunshop Group
Description
APT19 is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy, pharmaceu... | APT19.md |
725bde59d993-1 | APT19 used PowerShell commands to execute payloads.(Citation: FireEye APT19)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery|
APT19 used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username.(Citation: Unit 42 C0d0so0 Jan 2016)|
|mitre-att... | APT19.md |
725bde59d993-2 | APT19 used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim’s machine.(Citation: Unit 42 C0d0so0 Jan 2016)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network,Office 365,Azure AD,IaaS,Google Workspace|T1059|Command and Scripting Interpreter|
APT19... | APT19.md |
725bde59d993-3 | APT19 HTTP malware variant decrypts strings using single-byte XOR keys.(Citation: Unit 42 C0d0so0 Jan 2016)|
|mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment|
APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.(Citation: ... | APT19.md |
869c6bc17ece-0 | APT28 - G0007
Created: 2017-05-31T21:31:48.664Z
Modified: 2023-03-26T17:51:20.401Z
Contributors: Sébastien Ruel, CGI,Drew Church, Splunk,Emily Ratliff, IBM,Richard Gold, Digital Shadows
Aliases
APT28,IRON TWILIGHT,SNAKEMACKEREL,Swallowtail,Group 74,Sednit,Sofacy,Pawn Storm,Fancy Bear,STRONTIUM,Tsar Team,Threat Gro... | APT28.md |
869c6bc17ece-1 | APT28 reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated... | APT28.md |
869c6bc17ece-2 | APT28 has changed extensions on files containing exfiltrated data to make them appear benign, and renamed a web shell instance to appear as a legitimate OWA page.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)|
|mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Containers|T1036|Masq... | APT28.md |
869c6bc17ece-3 | APT28 has staged archives of collected data on a target's Outlook Web Access (OWA) server.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)|
|mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1560.001|Archive via Utility|
APT28 has used a variety of utilities, including WinRAR, to a... | APT28.md |
869c6bc17ece-4 | APT28 has obtained and used open-source tools like
Koadic,
Mimikatz, and
Responder.(Citation: Palo Alto Sofacy 06-2018)(Citation: Securelist Sofacy Feb 2018)(Citation: FireEye APT28 Hospitality Aug 2017)|
|mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1204.001|Malicious Link|
APT28 has tricked u... | APT28.md |
869c6bc17ece-5 | APT28 has deployed malware that has copied itself to the startup directory for persistence.(Citation: TrendMicro Pawn Storm Dec 2020)|
|mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1102.002|Bidirectional Communication|
APT28 has used Google Drive for C2.(Citation: TrendMicro Pawn Storm Dec 2020)|
... | APT28.md |
869c6bc17ece-6 | APT28 has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites.(Citation: US District Court Indictment GRU Oct 2018)(Citation: Cybersecurity Advisory GRU Brute Force Cam... | APT28.md |
869c6bc17ece-7 | APT28 regularly deploys both publicly available (ex:
Mimikatz) and custom password retrieval tools on victims.(Citation: ESET Sednit Part 2)(Citation: DOJ GRU Indictment Jul 2018)(Citation: US District Court Indictment GRU Oct 2018) |
|mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1071.001|Web Pro... | APT28.md |
869c6bc17ece-8 | APT28 installed a Delphi backdoor that used a custom algorithm for C2 communications.(Citation: ESET Zebrocy May 2019)|
|mitre-attack|enterprise-attack,mobile-attack|Windows|T1221|Template Injection|
APT28 used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro. (Cit... | APT28.md |
869c6bc17ece-9 | APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.(Citation: DOJ GRU Indictment Jul 2018)|
|mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link|
APT28 sent spearphishing emails which use... | APT28.md |
869c6bc17ece-10 | APT28 has collected information from Microsoft SharePoint services within target networks.(Citation: RSAC 2015 Abu Dhabi Stefano Maccaglia)|
|mitre-attack|enterprise-attack,mobile-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment|
APT28 sent spearphishing emails containing malicious Microsoft Office and RA... | APT28.md |
869c6bc17ece-11 | APT28 macro uses the command
APT28 exploited a Windows SMB Remote Code Execution Vulnerability to conduct lateral movement.(Citation: FireEye APT28)(Citation: FireEye APT28 Hospitality Aug 2017)(Citation: MS17-010 March 2017)|
|mitre-attack|enterprise-attack,mobile-attack|Windows|T1037.001|Logon Script (Windows)|An
A... | APT28.md |
869c6bc17ece-12 | APT28 has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.(Citation: DOJ GRU Indictment Jul 2018)|
|mitre-attack|enterprise-attack,mobile-attack|Windows|T1134.001|Token Impersonation/Theft|
APT28 has used CVE-2015-1701 to access the SYSTEM token and copy it into t... | APT28.md |
869c6bc17ece-13 | APT28 has used pass the hash for lateral movement.(Citation: Microsoft SIR Vol 19)|
|mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1025|Data from Removable Media|An
APT28 backdoor may collect the entire contents of an inserted USB device.(Citation: Microsoft SIR Vol 19)|
|mitre-attack|enterprise-at... | APT28.md |
869c6bc17ece-14 | APT28 regularly deploys both publicly available (ex:
Mimikatz) and custom password retrieval tools on victims.(Citation: ESET Sednit Part 2)(Citation: DOJ GRU Indictment Jul 2018) They have also dumped the LSASS process memory using the MiniDump function.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July ... | APT28.md |
869c6bc17ece-15 | APT28 has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges.(Citation: Bitdefender APT28 Dec 2015)(Citation: Microsoft SIR Vol 19)(Citation: Securelist Sofacy Feb 2018)|
|mitre-attack|enterprise-attack,mobile-attack|Windows|T1091|Replication Through Removable Media|
APT28 uses... | APT28.md |
869c6bc17ece-16 | APT28 has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.(Citation: Bitdefender APT28 Dec 2015)(Citation: Unit 42 Playbook Dec 2017)(Citation: Accenture SNAKEMACKEREL Nov 2018)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cyber... | APT28.md |
70ab680d3c44-0 | APT29 - G0016
Created: 2017-05-31T21:31:52.748Z
Modified: 2023-04-16T22:25:01.191Z
Contributors: Daniyal Naeem, BT Security,Matt Brenton, Zurich Insurance Group,Katie Nickels, Red Canary,Joe Gumke, U.S. Bank
Aliases
APT29,IRON RITUAL,IRON HEMLOCK,NobleBaron,Dark Halo,StellarParticle,NOBELIUM,UNC2452,YTTRIUM,The Du... | APT29.md |
70ab680d3c44-1 | Techniques Used
APT29 has used residential proxies, including Azure Virtual Machines, to obfuscate their access to victim environments.(Citation: Mandiant APT29 Microsoft 365 2022)|
|mitre-attack|enterprise-attack|Office 365,Windows,Google Workspace|T1114.002|Remote Email Collection|
APT29 has collected emails from t... | APT29.md |
70ab680d3c44-2 | APT29 has disabled Purview Audit on targeted accounts prior to stealing emails from Microsoft 365 tenants.(Citation: Mandiant APT29 Microsoft 365 2022)|
|mitre-attack|enterprise-attack|IaaS,Azure AD,Office 365,SaaS,Google Workspace|T1059.009|Cloud API|
APT29 has leveraged the Microsoft Graph API to perform various ac... | APT29.md |
70ab680d3c44-3 | APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.(Citation: ESET T3 Threat Report 2021) |
|mitre-attack|enterprise-attack|PRE|T1586.002|Email Accounts|
APT29 has compromised email accounts to further enable phishing campaigns and taken control of dor... | APT29.md |
70ab680d3c44-4 | APT29 has use
APT29 has obtained and used a variety of tools including
Mimikatz,
SDelete,
Tor,
meek, and
Cobalt Strike.(Citation: Mandiant No Easy Breach)(Citation: F-Secure The Dukes)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.001|Binary Padding|
APT29 used large size files to avoid detection by... | APT29.md |
70ab680d3c44-5 | APT29 has used various forms of spearphishing attempting to get a user to click on a malicous link.(Citation: MSTIC NOBELIUM May 2021)(Citation: Secureworks IRON RITUAL USAID Phish May 2021)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|
APT29 has downloaded additional tools and malw... | APT29.md |
70ab680d3c44-6 | APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware, such as
HAMMERTOSS.
APT29 has also used legitimate web services such as Dropbox and Constant Contact in their operations.(Citation: FireEye APT29)(Citation: MSTIC NOBELIUM May 2021)|
|mitre-attack|enterprise-attack|Windows... | APT29.md |
70ab680d3c44-7 | APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.(Citation: Mandiant No Easy Breach)(Citation: MSTIC NOBELIUM May 2021)(Citation: Secureworks IRON RITUAL USAID Phish May 2021)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitatio... | APT29.md |
70ab680d3c44-8 | APT29 used Kerberos ticket attacks for lateral movement.(Citation: Mandiant No Easy Breach)|
|mitre-attack|enterprise-attack|Windows|T1047|Windows Management Instrumentation|
APT29 used WMI to steal credentials and execute backdoors at a future time.(Citation: Mandiant No Easy Breach)|
|mitre-attack|enterprise-attack|... | APT29.md |
7782c4e87a52-0 | APT3 - G0022
Created: 2017-05-31T21:31:55.853Z
Modified: 2021-10-01T19:09:20.817Z
Contributors: Patrick Sungbahadoor
Aliases
APT3,Gothic Panda,Pirpi,UPS Team,Buckeye,Threat Group-0110,TG-0110
Description
APT3 is a China-based threat group that researchers have attributed to China's Ministry of State Security.(Ci... | APT3.md |
7782c4e87a52-1 | APT3 has been known to use
PowerShell windows.(Citation: FireEye Operation Double Tap)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1090.002|External Proxy|An
APT3 downloader establishes SOCKS5 connections for its initial C2.(Citation: FireEye Operation Double Tap)|
|mitre-attack|enterprise-attack|Windows,Az... | APT3.md |
7782c4e87a52-2 | APT3 has a tool that can obtain information about the local system.(Citation: Symantec Buckeye)(Citation: evolution of pirpi)|
|mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers|T1552.001|Credentials In Files|
APT3 has a tool that can locate credentials in files on the file system such as those from F... | APT3.md |
7782c4e87a52-3 | APT3 has been known to create or enable accounts, such as
APT3 replaces the Sticky Keys binary
APT3 has used tools to compress data before exfilling it.(Citation: aptsim)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|
APT3 has a tool that can copy files to remote machines.(Citation... | APT3.md |
7782c4e87a52-4 | APT3 obfuscates files or information to help evade defensive measures.(Citation: Symantec Buckeye)|
|mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery|
APT3 has a tool that can enumerate current network connections.(Citation: Symantec Buckeye)(Citation: FireEye ... | APT3.md |
7782c4e87a52-5 | APT3 downloader first establishes a SOCKS5 connection to 192.157.198[.]103 using TCP port 1913; once the server response is verified, it then requests a connection to 192.184.60[.]229 on TCP port 81.(Citation: FireEye Operation Double Tap)|
|mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task|An
APT3 downl... | APT3.md |
869b2ceae43e-0 | APT30 - G0013
Created: 2017-05-31T21:31:51.026Z
Modified: 2020-07-29T19:34:28.999Z
Contributors:
Aliases
APT30
Description
APT30 is a threat group suspected to be associated with the Chinese government. While Naikon shares some characteristics with APT30, the two groups do not appear to be exact matches.(Citatio... | APT30.md |
27e1939db0f2-0 | APT32 - G0050
Created: 2017-12-14T16:46:06.044Z
Modified: 2023-03-21T21:04:18.158Z
Contributors: Romain Dumont, ESET
Aliases
APT32,SeaLotus,OceanLotus,APT-C-00
Description
APT32 is a suspected Vietnam-based threat group that has been active since at least 2014. The group has targeted multiple private sector indu... | APT32.md |
27e1939db0f2-1 | APT32 has conducted targeted surveillance against activists and bloggers.(Citation: Amnesty Intl. Ocean Lotus February 2021)|
|mitre-attack|enterprise-attack|PRE|T1589.002|Email Addresses|
APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.(Citation: Amnesty Intl. Ocea... | APT32.md |
27e1939db0f2-2 | APT32 has used COM scriptlets to download Cobalt Strike beacons.(Citation: Cybereason Cobalt Kitty 2017) |
|mitre-attack|enterprise-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging|
APT32 has abused the PasswordChangeNotify to monitor for and capture account password changes.(Citation: Cybereason Cobalt Kitty 2... | APT32.md |
27e1939db0f2-3 | APT32 modified Windows Services to ensure PowerShell scripts were loaded on the system.
APT32 also creates a Windows service to establish persistence.(Citation: ESET OceanLotus)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)|
|mitre-attack|enterprise-attack|Windows,Linux,macOS|T1003|OS Cre... | APT32.md |
27e1939db0f2-4 | APT32 has used email for C2 via an Office macro.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1048.003|Exfiltration Over Unencrypted Non-C2 Protocol|
APT32's backdoor can exfiltrate data by encoding it in the subdomain f... | APT32.md |
27e1939db0f2-5 | APT32's backdoor has modified the Windows Registry to store the backdoor's configuration. (Citation: ESET OceanLotus Mar 2019) |
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560|Archive Collected Data|
APT32's backdoor has used LZMA compression and RC4 encryption before exfiltration.(Citation: ESET OceanLot... | APT32.md |
27e1939db0f2-6 | APT32 established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Offi... | APT32.md |
27e1939db0f2-7 | APT32 performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities.(Citation: Cybereason Cobalt Kitty 2017)|
|mitre-attack|enterprise-attack|Windows|T1550.003|Pass the Ticket|
APT32 successfully gained remote access by using pass the ticket.(Citation: Cybe... | APT32.md |
27e1939db0f2-8 | APT32 has cleared select event log entries.(Citation: FireEye APT32 May 2017)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|
APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.(Citation: ESET OceanLotus)(Citation: Cybereason Oceanlo... | APT32.md |
27e1939db0f2-9 | APT32 has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses.(Citation: Twitter ItsReallyNick Status Update APT32 PubPrn)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell|
APT32 has used Web shells to maintain access to victim websites.(Citation: Vo... | APT32.md |
27e1939db0f2-10 | APT32 has used scheduled tasks to persist on victim systems.(Citation: FireEye APT32 May 2017)(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1072|Software Deployment Tools|
APT32 compromised Mc... | APT32.md |
27e1939db0f2-11 | APT32 has used a random value to modify the timestamp of the file storing the clientID.(Citation: FireEye APT32 May 2017)(Citation: ESET OceanLotus Mar 2019)(Citation: ESET OceanLotus macOS April 2019)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1078.003|Local Accounts|
APT32 has used legitimate l... | APT32.md |
fb6fac0f663f-0 | APT33 - G0064
Created: 2018-04-18T17:59:24.739Z
Modified: 2023-03-08T22:07:25.123Z
Contributors: Dragos Threat Intelligence
Aliases
APT33,HOLMIUM,Elfin
Description
APT33 is a suspected Iranian threat group that has carried out operations since at least 2013. The group has targeted organizations across multiple... | APT33.md |
fb6fac0f663f-1 | APT33 has used compromised Office 365 accounts in tandem with
Ruler in an attempt to gain control of endpoints.(Citation: Microsoft Holmium June 2020)|
|mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1571|Non-Standard Port|
APT33 has used HTTP over TCP ports 808 and 880 for command and control.(Citati... | APT33.md |
fb6fac0f663f-2 | APT33 has used a variety of publicly available tools like
LaZagne to gather credentials.(Citation: Symantec Elfin Mar 2019)(Citation: FireEye APT33 Guardrail)|
|mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers|T1110.003|Password Spraying|
APT33 ha... | APT33.md |
fb6fac0f663f-3 | APT33 has used FTP to exfiltrate files (separately from the C2 channel).(Citation: Symantec Elfin Mar 2019)|
|mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1071.001|Web Protocols|
APT33 has used HTTP for command and control.(Citation: Symantec Elfin Mar 2019)|
|mitre-attack|enterprise-attack,ics-attac... | APT33.md |
fb6fac0f663f-4 | APT33 has used SniffPass to collect credentials by sniffing network traffic.(Citation: Symantec Elfin Mar 2019)|
|mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution|
APT33 has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain... | APT33.md |
fb6fac0f663f-5 | APT33 utilize backdoors capable of capturing screenshots once installed on a system. (Citation: Jacqueline O'Leary et al. September 2017)(Citation: Junnosuke Yagi March 2017)|
|mitre-attack|enterprise-attack,ics-attack|Engineering Workstation,Human-Machine Interface,Control Server,Data Historian|T0865|Spearphishing Att... | APT33.md |
dbe259a980bf-0 | APT37 - G0067
Created: 2018-04-18T17:59:24.739Z
Modified: 2021-10-15T16:54:01.193Z
Contributors: Valerii Marchuk, Cybersecurity Help s.r.o.
Aliases
APT37,Richochet Chollima,InkySquid,ScarCruft,Reaper,Group123,TEMP.Reaper
Description
APT37 is a North Korean state-sponsored cyber espionage group that has been acti... | APT37.md |
dbe259a980bf-1 | APT37 executes shellcode and a VBA script to decode Base64 strings.(Citation: Talos Group123)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.003|Steganography|
APT37 uses steganography to send images to users that are embedded with shellcode.(Citation: Talos Group123)(Citation: Securelist ScarCruft May 201... | APT37.md |
dbe259a980bf-2 | APT37 uses HTTPS to conceal C2 communications.(Citation: Talos Group123)|
|mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery|
APT37 collects the computer name, the BIOS model, and execution path.(Citation: Talos Group123)|
|mitre-attack|enterprise-attack|Linux,macOS,Win... | APT37.md |
dbe259a980bf-3 | APT37 has used the command-line interface.(Citation: FireEye APT37 Feb 2018)(Citation: Talos Group123)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution|
APT37 has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020... | APT37.md |
dbe259a980bf-4 | APT37 has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a v... | APT37.md |
63837688fa2b-0 | APT38 - G0082
Created: 2019-01-29T21:27:24.793Z
Modified: 2022-01-18T17:13:14.610Z
Contributors:
Aliases
APT38,NICKEL GLADSTONE,BeagleBoyz,Bluenoroff,Stardust Chollima
Description
APT38 is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Re... | APT38.md |
63837688fa2b-1 | APT38 has modified data timestamps to mimic files that are in the same folder on a compromised host.(Citation: CISA AA20-239A BeagleBoyz August 2020)|
|mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1135|Network Share Discovery|
APT38 has enumerated network shares on a compromised host.(Citation: CISA ... | APT38.md |
63837688fa2b-2 | APT38 has identified security software, configurations, defensive tools, and sensors installed on a compromised system.(Citation: CISA AA20-239A BeagleBoyz August 2020)|
|mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1562.003|Impair Command History Logging|
APT38 has prepended a space to all o... | APT38.md |
63837688fa2b-3 | APT38 has collected data from a compromised host.(Citation: CISA AA20-239A BeagleBoyz August 2020)|
|mitre-attack|enterprise-attack,ics-attack|Windows|T1569.002|Service Execution|
APT38 has created new services or modified existing ones to run executables, commands, or scripts.(Citation: CISA AA20-239A BeagleBoyz Augu... | APT38.md |
63837688fa2b-4 | APT38 has attempted to lure victims into enabling malicious macros within email attachments.(Citation: CISA AA20-239A BeagleBoyz August 2020)|
|mitre-attack|enterprise-attack,ics-attack|Linux,macOS|T1053.003|Cron|
APT38 has used cron to create pre-scheduled and periodic background jobs on a Linux system.(Citation: CI... | APT38.md |
63837688fa2b-5 | APT38 has used a custom MBR wiper named BOOTWRECK to render systems inoperable.(Citation: FireEye APT38 Oct 2018)|
|mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1565.001|Stored Data Manipulation|
APT38 has used DYEPACK to create, delete, and alter records in databases used for SWIFT transactions.(Cit... | APT38.md |
63837688fa2b-6 | APT38 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.(Citation: FireEye APT38 Oct 2018)|
|mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS|T1115|Clipboard Data|
APT38 used a Trojan called KEYLIME to collect data from the clipboard.(Citation: FireEye APT38 Oc... | APT38.md |
63837688fa2b-7 | APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants.(Citation: FireEye APT38 Oct 2018)| | APT38.md |
58b296926e7e-0 | APT39 - G0087
Created: 2019-02-19T16:01:38.585Z
Modified: 2022-09-02T18:03:29.024Z
Contributors:
Aliases
APT39,ITG07,Chafer,Remix Kitten
Description
APT39 is one of several names for cyber espionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company Rana Inte... | APT39.md |
58b296926e7e-1 | APT39 has exfiltrated stolen victim data through C2 communications.(Citation: FBI FLASH APT39 September 2020)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1074.001|Local Data Staging|
APT39 has utilized tools to aggregate data prior to exfiltration.(Citation: FBI FLASH APT39 September 2020)|
|mitre-attack|ent... | APT39.md |
58b296926e7e-2 | APT39 has used SQL injection for initial compromise.(Citation: Symantec Chafer February 2018)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1113|Screen Capture|
APT39 has used a screen capture utility to take screenshots on a compromised host.(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 ... | APT39.md |
58b296926e7e-3 | APT39 has used HTTP in communications with C2.(Citation: BitDefender Chafer May 2020)(Citation: FBI FLASH APT39 September 2020)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS|T1059.006|Python|
APT39 has used a command line utility and a network scanner written in python.(Citation: BitDefender Chafer May 2020)(Ci... | APT39.md |
58b296926e7e-4 | APT39 has used various tools to proxy C2 communications.(Citation: BitDefender Chafer May 2020)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1555|Credentials from Password Stores|
APT39 has used the Smartftp Password Decryptor tool to decrypt FTP passwords.(Citation: BitDefender Chafer May 2020)|
|mitre-attac... | APT39.md |
58b296926e7e-5 | APT39 has installed ANTAK and ASPXSPY web shells.(Citation: FireEye APT39 Jan 2019)|
|mitre-attack|enterprise-attack|Linux,macOS|T1021.004|SSH|
APT39 used secure shell (SSH) to move laterally among their targets.(Citation: FireEye APT39 Jan 2019)|
|mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,L... | APT39.md |
58b296926e7e-6 | APT39 has used WinRAR and 7-Zip to compress an archive stolen data.(Citation: FireEye APT39 Jan 2019)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1018|Remote System Discovery|
APT39 has used
NBTscan and custom tools to discover remote systems.(Citation: FireEye APT39 Jan 2019)(Citation: BitDefender ... | APT39.md |
58b296926e7e-7 | APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.(Citation: FireEye APT39 Jan 2019)(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 September 2020)| | APT39.md |
c14154e5c888-0 | APT41 - G0096
Created: 2019-09-23T13:43:36.945Z
Modified: 2023-03-23T15:45:58.846Z
Contributors: Kyaw Pyiyt Htet, @KyawPyiytHtet
Aliases
APT41,Wicked Panda
Description
APT41 is a threat group that researchers have assessed as Chinese state-sponsored espionage group that also conducts financially-motivated operat... | APT41.md |
c14154e5c888-1 | APT41 has used search order hijacking to execute malicious payloads, such as Winnti RAT.(Citation: Crowdstrike GTR2020 Mar 2020)|
|mitre-attack|enterprise-attack|Windows|T1021.002|SMB/Windows Admin Shares|
APT41 has transferred implant files using Windows Admin Shares.(Citation: Crowdstrike GTR2020 Mar 2020)|
|mitre-a... | APT41.md |
c14154e5c888-2 | ftp.(Citation: FireEye APT41 March 2020)|
|mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application|
APT41 exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gat... | APT41.md |
c14154e5c888-3 | APT41 used legitimate executables to perform DLL side-loading of their malware.(Citation: FireEye APT41 Aug 2019) |
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion|
APT41 deleted files from the system.(Citation: FireEye APT41 Aug 2019) |
|mitre-attack|enterprise-attack|Windows|T1218.001|Com... | APT41.md |
c14154e5c888-4 | APT41 has created user accounts.(Citation: FireEye APT41 Aug 2019) |
|mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task|
APT41 used a compromised account to create a scheduled task on a system.(Citation: FireEye APT41 Aug 2019)(Citation: Crowdstrike GTR2020 Mar 2020)|
|mitre-attack|enterprise-attack|Wind... | APT41.md |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 958