Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. APT28

APT28

APT28 is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.[1][2] This group has been active since at least 2004.[3][4][5][6][7][8][9][10][11][12][13]

APT28 reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election.[5] In 2018, the US indicted five GRU Unit 26165 officers associated withAPT28 for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.[14] Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to asSandworm Team.

ID: G0007
Associated Groups: IRON TWILIGHT, SNAKEMACKEREL, Swallowtail, Group 74, Sednit, Sofacy, Pawn Storm, Fancy Bear, STRONTIUM, Tsar Team, Threat Group-4127, TG-4127, Forest Blizzard, FROZENLAKE, GruesomeLarch
Contributors: Sébastien Ruel, CGI; Drew Church, Splunk; Emily Ratliff, IBM; Richard Gold, Digital Shadows
Version: 5.2
Created: 31 May 2017
Last Modified: 10 March 2025

Associated Group Descriptions

NameDescription
IRON TWILIGHT

[15][16]

SNAKEMACKEREL

[17]

Swallowtail

[12]

Group 74

[18]

Sednit

This designation has been used in reporting both to refer to the threat group and its associated malwareJHUHUGIT.[8][7][19][4]

Sofacy

This designation has been used in reporting both to refer to the threat group and its associated malware.[6][7][5][20][4][18]

Pawn Storm

[7][20][21]

Fancy Bear

[5][19][20][4][18][12][22][2]

STRONTIUM

[19][20][23][24][21][2]

Tsar Team

[20][18][18]

Threat Group-4127

[7]

TG-4127

[7]

Forest Blizzard

[25]

FROZENLAKE

[26]

GruesomeLarch

[27]

Campaigns

IDNameFirst SeenLast SeenReferencesTechniques
C0051APT28 Nearest Neighbor CampaignFebruary 2022[27]November 2024[27]

APT28 Nearest Neighbor Campaign was conducted byAPT28 from early February 2022 to November 2024.[27]

Archive Collected Data:Archive via Utility,Brute Force:Password Spraying,Command and Scripting Interpreter:PowerShell,Command and Scripting Interpreter:Windows Command Shell,Compromise Infrastructure,Data Staged:Local Data Staging,Deobfuscate/Decode Files or Information,Direct Volume Access,Disk Wipe:Disk Content Wipe,Exfiltration Over Web Service,Impair Defenses:Disable or Modify System Firewall,OS Credential Dumping:NTDS,OS Credential Dumping:Security Account Manager,Proxy:Internal Proxy,Remote Services:Remote Desktop Protocol,Remote Services:SMB/Windows Admin Shares,System Network Configuration Discovery:Wi-Fi Discovery,Wi-Fi Networks
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1134.001Access Token Manipulation:Token Impersonation/Theft

APT28 has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation.[28]

EnterpriseT1098.002Account Manipulation:Additional Email Delegate Permissions

APT28 has used a Powershell cmdlet to grant theApplicationImpersonation role to a compromised account.[2]

EnterpriseT1583.001Acquire Infrastructure:Domains

APT28 registered domains imitating NATO, OSCE security websites, Caucasus information resources, and other organizations.[6][14][29]

.003Acquire Infrastructure:Virtual Private Server

APT28 hosted phishing domains on free services for brief periods of time during campaigns.[26]

.006Acquire Infrastructure:Web Services

APT28 has used newly-created Blogspot pages for credential harvesting operations.[29]

EnterpriseT1595.002Active Scanning:Vulnerability Scanning

APT28 has performed large-scale scans in an attempt to find vulnerable servers.[30]

EnterpriseT1557.004Adversary-in-the-Middle:Evil Twin

APT28 has used a Wi-Fi Pineapple to set up Evil Twin Wi-Fi Poisoning for the purposes of capturing victim credentials or planting espionage-oriented malware.[14]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Later implants used byAPT28, such asCHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration.[6][2]

.003Application Layer Protocol:Mail Protocols

APT28 has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims.[6][2]

EnterpriseT1560Archive Collected Data

APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.[3]

.001Archive via Utility

APT28 has used a variety of utilities, including WinRAR, to archive collected data with password protection.[2]

DuringAPT28 Nearest Neighbor Campaign,APT28 used built-in PowerShell capabilities (Compress-Archive cmdlet) to compress collected data.[27]

EnterpriseT1119Automated Collection

APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.[3]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

APT28 has deployed malware that has copied itself to the startup directory for persistence.[21]

EnterpriseT1037.001Boot or Logon Initialization Scripts:Logon Script (Windows)

AnAPT28 loader Trojan adds the Registry keyHKCU\Environment\UserInitMprLogonScript to establish persistence.[31]

EnterpriseT1110Brute Force

APT28 can perform brute force attacks to obtain credentials.[30][21][32]

.001Password Guessing

APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days.[24]APT28 has also used a Kubernetes cluster to conduct distributed, large-scale password guessing attacks.[2]

.003Password Spraying

APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks.[24][32]APT28 has also used a Kubernetes cluster to conduct distributed, large-scale password spray attacks.[2]

DuringAPT28 Nearest Neighbor Campaign,APT28 performed password-spray attacks against public facing services to validate credentials.[27]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

APT28 downloads and executes PowerShell scripts and performs PowerShell commands.[11][21][2]

DuringAPT28 Nearest Neighbor Campaign,APT28 used PowerShell cmdletGet-ChildItem to access credentials, among other PowerShell functions deployed.[27]

.003Command and Scripting Interpreter:Windows Command Shell

AnAPT28 loader Trojan uses a cmd.exe and batch script to run its payload.[31] The group has also used macros to execute payloads.[18][33][17][21]

DuringAPT28 Nearest Neighbor Campaign,APT28 usedcmd.exe for execution.[27]

EnterpriseT1092Communication Through Removable Media

APT28 uses a tool that captures information from air-gapped computers via an infected USB and transfers it to network-connected computer when the USB is inserted.[34]

EnterpriseT1586.002Compromise Accounts:Email Accounts

APT28 has used compromised email accounts to send credential phishing emails.[29]

EnterpriseT1584.008Compromise Infrastructure:Network Devices

APT28 compromised Ubiquiti network devices to act as collection devices for credentials compromised via phishing webpages.[26]

EnterpriseT1213Data from Information Repositories

APT28 has collected files from various information repositories.[2]

.002Sharepoint

APT28 has collected information from Microsoft SharePoint services within target networks.[35]

EnterpriseT1005Data from Local System

APT28 has retrieved internal documents from machines inside victim environments, including by usingForfiles to stage documents before exfiltration.[36][3][30][2]

EnterpriseT1039Data from Network Shared Drive

APT28 has collected files from network shared drives.[2]

EnterpriseT1025Data from Removable Media

AnAPT28 backdoor may collect the entire contents of an inserted USB device.[34]

EnterpriseT1001.001Data Obfuscation:Junk Data

APT28 added "junk data" to each encoded string, preventing trivial decoding without knowledge of the junk removal algorithm. Each implant was given a "junk length" value when created, tracked by the controller software to allow seamless communication but prevent analysis of the command protocol on the wire.[6]

EnterpriseT1074.001Data Staged:Local Data Staging

APT28 has stored captured credential information in a file named pi.log.[34]

DuringAPT28 Nearest Neighbor Campaign,APT28 staged captured credential information in theC:\ProgramData directory.[27]

.002Data Staged:Remote Data Staging

APT28 has staged archives of collected data on a target's Outlook Web Access (OWA) server.[2]

EnterpriseT1030Data Transfer Size Limits

APT28 has split archived exfiltration files into chunks smaller than 1MB.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

AnAPT28 macro uses the commandcertutil -decode to decode contents of a .txt file storing the base64 encoded payload.[37][11]

DuringAPT28 Nearest Neighbor Campaign,APT28 unarchived data using the GUI version of WinRAR.[27]

EnterpriseT1006Direct Volume Access

DuringAPT28 Nearest Neighbor Campaign,APT28 accessed volume shadow copies through executingvssadmin in order to dump the NTDS.dit file.[27]

EnterpriseT1561.001Disk Wipe:Disk Content Wipe

DuringAPT28 Nearest Neighbor Campaign,APT28 used the native Microsoft utilitycipher.exe to securely wipe files and folders – overwriting the deleted data usingcmd.exe /c cipher /W:C.[27]

EnterpriseT1189Drive-by Compromise

APT28 has compromised targets via strategic web compromise utilizing custom exploit kits.[16]APT28 used reflected cross-site scripting (XSS) against government websites to redirect users to phishing webpages.[26]

EnterpriseT1114.002Email Collection:Remote Email Collection

APT28 has collected emails from victim Microsoft Exchange servers.[3][2]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

APT28 installed a Delphi backdoor that used a custom algorithm for C2 communications.[13]

EnterpriseT1546.015Event Triggered Execution:Component Object Model Hijacking

APT28 has used COM hijacking for persistence by replacing the legitimateMMDeviceEnumerator object with a payload.[38][13]

EnterpriseT1048.002Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

APT28 has exfiltrated archives of collected data previously staged on a target's OWA server via HTTPS.[2]

EnterpriseT1567Exfiltration Over Web Service

APT28 can exfiltrate data over Google Drive.[21]

DuringAPT28 Nearest Neighbor Campaign,APT28 exfiltrated data over public-facing webservers – such as Google Drive.[27]

EnterpriseT1190Exploit Public-Facing Application

APT28 has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites.[14][2]

EnterpriseT1203Exploitation for Client Execution

APT28 has exploited Microsoft Office vulnerability CVE-2017-0262 for execution.[22]

EnterpriseT1211Exploitation for Defense Evasion

APT28 has used CVE-2015-4902 to bypass security features.[39][34]

EnterpriseT1068Exploitation for Privilege Escalation

APT28 has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263, and CVE-2022-38028 to escalate privileges.[39][34][22][27]

EnterpriseT1210Exploitation of Remote Services

APT28 exploited a Windows SMB Remote Code Execution Vulnerability to conduct lateral movement.[6][40][41]

EnterpriseT1133External Remote Services

APT28 has usedTor and a variety of commercial VPN services to route brute force authentication attempts.[2]

EnterpriseT1083File and Directory Discovery

APT28 has usedForfiles to locate PDF, Excel, and Word documents during collection. The group also searched a compromised DCCC computer for specific terms.[36][3]

EnterpriseT1589.001Gather Victim Identity Information:Credentials

APT28 has harvested user's login credentials.[32]

EnterpriseT1591Gather Victim Org Information

APT28 has used large language models (LLMs) to gather information about satellite capabilities.[42][43]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

APT28 has saved files with hidden file attributes.[18][18]

.003Hide Artifacts:Hidden Window

APT28 has used the WindowStyle parameter to concealPowerShell windows.[11][44]

EnterpriseT1562.004Impair Defenses:Disable or Modify System Firewall

DuringAPT28 Nearest Neighbor Campaign,APT28 added rules to a victim's Windows firewall to set up a series of port-forwards allowing traffic to target systems.[27]

EnterpriseT1070.001Indicator Removal:Clear Windows Event Logs

APT28 has cleared event logs, including by using the commandswevtutil cl System andwevtutil cl Security.[5][3]

.004Indicator Removal:File Deletion

APT28 has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.[3]

.006Indicator Removal:Timestomp

APT28 has performed timestomping on victim files.[5]

EnterpriseT1105Ingress Tool Transfer

APT28 has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.[39][31][17][21][2]

EnterpriseT1056.001Input Capture:Keylogging

APT28 has used tools to perform keylogging.[34][3][21]

EnterpriseT1559.002Inter-Process Communication:Dynamic Data Exchange

APT28 has deliveredJHUHUGIT andKoadic by executing PowerShell commands through DDE in Word documents.[44][45][11]

EnterpriseT1036Masquerading

APT28 has renamed the WinRAR utility to avoid detection.[2]

.005Match Legitimate Resource Name or Location

APT28 has changed extensions on files containing exfiltrated data to make them appear benign, and renamed a web shell instance to appear as a legitimate OWA page.[2]

EnterpriseT1498Network Denial of Service

In 2016,APT28 conducted a distributed denial of service (DDoS) attack against the World Anti-Doping Agency.[14]

EnterpriseT1040Network Sniffing

APT28 deployed the open source tool Responder to conduct NetBIOS Name Service poisoning, which captured usernames and hashed passwords that allowed access to legitimate credentials.[6][40]APT28 close-access teams have used Wi-Fi pineapples to intercept Wi-Fi signals and user credentials.[14]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

APT28 encrypted a .dll payload using RTL and a custom encryption algorithm.APT28 has also obfuscated payloads with base64, XOR, and RC4.[39][37][11][18][17]

EnterpriseT1588.002Obtain Capabilities:Tool

APT28 has obtained and used open-source tools likeKoadic,Mimikatz, andResponder.[11][22][40]

EnterpriseT1137.002Office Application Startup:Office Test

APT28 has used the Office Test persistence mechanism within Microsoft Office by adding the Registry keyHKCU\Software\Microsoft\Office test\Special\Perf to execute code.[46]

EnterpriseT1003OS Credential Dumping

APT28 regularly deploys both publicly available (ex:Mimikatz) and custom password retrieval tools on victims.[47][3][14]

.001LSASS Memory

APT28 regularly deploys both publicly available (ex:Mimikatz) and custom password retrieval tools on victims.[47][3] They have also dumped the LSASS process memory using the MiniDump function.[2]

.002Security Account Manager

DuringAPT28 Nearest Neighbor Campaign,APT28 used the following commands to dump SAM, SYSTEM, and SECURITY hives:reg save hklm\sam, reg save hklm\system, andreg save hklm\security.[27]

.003NTDS

APT28 has used the ntdsutil.exe utility to export the Active Directory database for credential access.[2]

DuringAPT28 Nearest Neighbor Campaign,APT28 dumped NTDS.dit through creating volume shadow copies viavssadmin.[27]

EnterpriseT1120Peripheral Device Discovery

APT28 uses a module to receive a notification every time a USB mass storage device is inserted into a victim.[34]

EnterpriseT1566.001Phishing:Spearphishing Attachment

APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments.[37][10][11][3][22][17][21][16]

EnterpriseT1598Phishing for Information

APT28 has used spearphishing to compromise credentials.[32][16]

.003Spearphishing Link

APT28 has conducted credential phishing campaigns with links that redirect to credential harvesting sites.[29][3][13][14][16]

EnterpriseT1542.003Pre-OS Boot:Bootkit

APT28 has deployed a bootkit along withDowndelph to ensure its persistence on the victim. The bootkit shares code with some variants ofBlackEnergy.[20]

EnterpriseT1057Process Discovery

AnAPT28 loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions.[31]

EnterpriseT1090.001Proxy:Internal Proxy

DuringAPT28 Nearest Neighbor Campaign,APT28 used the built-innetsh portproxy command to create internal proxies on compromised systems.[27]

.002Proxy:External Proxy

APT28 used other victims as proxies to relay command traffic, for instance using a compromised Georgian military email server as a hop point to NATO victims. The group has also used a tool that acts as a proxy to allow C2 even if the victim is behind a router.APT28 has also used a machine to relay and obscure communications betweenCHOPSTICK and their server.[6][39][3]

.003Proxy:Multi-hop Proxy

APT28 has routed traffic overTor and VPN servers to obfuscate their activities.[21]

EnterpriseT1021.001Remote Services:Remote Desktop Protocol

DuringAPT28 Nearest Neighbor Campaign,APT28 used RDP for lateral movement.[27]

.002Remote Services:SMB/Windows Admin Shares

APT28 has mapped network drives usingNet and administrator credentials.[2]

DuringAPT28 Nearest Neighbor Campaign,APT28 leveraged SMB to transfer files and move laterally.[27]

EnterpriseT1091Replication Through Removable Media

APT28 uses a tool to infect connected USB devices and transmit itself to air-gapped computers when the infected USB device is inserted.[34]

EnterpriseT1014Rootkit

APT28 has used a UEFI (Unified Extensible Firmware Interface) rootkit known asLoJax.[12][48]

EnterpriseT1113Screen Capture

APT28 has used tools to take screenshots from victims.[47][49][3][16]

EnterpriseT1596Search Open Technical Databases

APT28 has used large language models (LLMs) to assist in script development and deployment.[42][43]

EnterpriseT1505.003Server Software Component:Web Shell

APT28 has used a modified and obfuscated version of the reGeorg web shell to maintain persistence on a target's Outlook Web Access (OWA) server.[2]

EnterpriseT1528Steal Application Access Token

APT28 has used several malicious applications to steal user OAuth access tokens including applications masquerading as "Google Defender" "Google Email Protection," and "Google Scanner" for Gmail users. They also targeted Yahoo users with applications masquerading as "Delivery Service" and "McAfee Email Protection".[50]

EnterpriseT1218.011System Binary Proxy Execution:Rundll32

APT28 executedCHOPSTICK by using rundll32 commands such asrundll32.exe "C:\Windows\twain_64.dll".APT28 also executed a .dll for a first stage dropper using rundll32.exe. AnAPT28 loader Trojan saved a batch script that uses rundll32 to execute a DLL payload.[5][39][11][31][13][2]

EnterpriseT1016.002System Network Configuration Discovery:Wi-Fi Discovery

DuringAPT28 Nearest Neighbor Campaign,APT28 collected information on wireless interfaces within range of a compromised system.[27]

EnterpriseT1221Template Injection

APT28 used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro.[51]

EnterpriseT1199Trusted Relationship

OnceAPT28 gained access to the DCCC network, the group then proceeded to use that access to compromise the DNC network.[3]

EnterpriseT1550.001Use Alternate Authentication Material:Application Access Token

APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts, including Gmail and Yahoo Mail.[50]

.002Use Alternate Authentication Material:Pass the Hash

APT28 has used pass the hash for lateral movement.[34]

EnterpriseT1204.001User Execution:Malicious Link

APT28 has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.[14][16]

.002User Execution:Malicious File

APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts.[37][17][16]

EnterpriseT1078Valid Accounts

APT28 has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder.[52][3][23][2]

.004Cloud Accounts

APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.[2]

EnterpriseT1102.002Web Service:Bidirectional Communication

APT28 has used Google Drive for C2.[21]

EnterpriseT1669Wi-Fi Networks

APT28 has exploited open Wi-Fi access points for initial access to target devices using the network.[27][53]

DuringAPT28 Nearest Neighbor Campaign,APT28 established wireless connections to secure, enterprise Wi-Fi networks belonging to a target organization for initial access into the environment.[27]

Software

IDNameReferencesTechniques
S0045ADVSTORESHELL[19][22]Application Layer Protocol:Web Protocols,Archive Collected Data,Archive Collected Data:Archive via Custom Method,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Windows Command Shell,Data Encoding:Standard Encoding,Data Staged:Local Data Staging,Encrypted Channel:Symmetric Cryptography,Encrypted Channel:Asymmetric Cryptography,Event Triggered Execution:Component Object Model Hijacking,Exfiltration Over C2 Channel,File and Directory Discovery,Indicator Removal:File Deletion,Input Capture:Keylogging,Modify Registry,Native API,Obfuscated Files or Information,Peripheral Device Discovery,Process Discovery,Query Registry,Scheduled Transfer,System Binary Proxy Execution:Rundll32,System Information Discovery
S0351Cannon[33][51]Application Layer Protocol:Mail Protocols,Boot or Logon Autostart Execution:Winlogon Helper DLL,Exfiltration Over C2 Channel,File and Directory Discovery,Ingress Tool Transfer,Local Storage Discovery,Process Discovery,Screen Capture,System Information Discovery,System Owner/User Discovery,System Time Discovery
S0160certutil[37][2]Archive Collected Data:Archive via Utility,Deobfuscate/Decode Files or Information,Ingress Tool Transfer,Subvert Trust Controls:Install Root Certificate
S0023CHOPSTICK[6][19][22][16]Application Layer Protocol:Mail Protocols,Application Layer Protocol:Web Protocols,Command and Scripting Interpreter,Communication Through Removable Media,Dynamic Resolution:Domain Generation Algorithms,Encrypted Channel:Symmetric Cryptography,Encrypted Channel:Asymmetric Cryptography,Fallback Channels,File and Directory Discovery,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Obfuscated Files or Information:Fileless Storage,Proxy:Internal Proxy,Query Registry,Replication Through Removable Media,Screen Capture,Software Discovery:Security Software Discovery,Virtualization/Sandbox Evasion
S1205cipher.exe[27]Disk Wipe:Disk Content Wipe
S0137CORESHELL[6][16]Application Layer Protocol:Web Protocols,Application Layer Protocol:Mail Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Data Encoding:Standard Encoding,Encrypted Channel:Symmetric Cryptography,Ingress Tool Transfer,Local Storage Discovery,Obfuscated Files or Information:Junk Code Insertion,Obfuscated Files or Information,System Binary Proxy Execution:Rundll32,System Information Discovery
S0243DealersChoice[10][16]Application Layer Protocol:Web Protocols,Command and Scripting Interpreter:Windows Command Shell,Exploitation for Client Execution
S0134Downdelph[20][16]Abuse Elevation Control Mechanism:Bypass User Account Control,Data Obfuscation:Junk Data,Encrypted Channel:Symmetric Cryptography,Hijack Execution Flow:DLL,Ingress Tool Transfer
S0502Drovorub[1]Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Kernel Modules and Extensions,Command and Scripting Interpreter:Unix Shell,Data from Local System,Deobfuscate/Decode Files or Information,Exfiltration Over C2 Channel,Indicator Removal:File Deletion,Ingress Tool Transfer,Non-Application Layer Protocol,Obfuscated Files or Information,Proxy:Internal Proxy,Rootkit
S0193Forfiles[36]Data from Local System,File and Directory Discovery,Indirect Command Execution
S0410Fysbis[54]Boot or Logon Autostart Execution:XDG Autostart Entries,Command and Scripting Interpreter:Unix Shell,Create or Modify System Process:Systemd Service,Data Encoding:Standard Encoding,File and Directory Discovery,Indicator Removal:File Deletion,Input Capture:Keylogging,Masquerading:Masquerade Task or Service,Masquerading:Match Legitimate Resource Name or Location,Obfuscated Files or Information:Encrypted/Encoded File,Process Discovery,System Information Discovery
S0135HIDEDRV[20]Process Injection:Dynamic-link Library Injection,Rootkit
S0044JHUHUGIT[8][19][22][14][16]Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Boot or Logon Initialization Scripts:Logon Script (Windows),Clipboard Data,Command and Scripting Interpreter:Windows Command Shell,Create or Modify System Process:Windows Service,Data Encoding:Standard Encoding,Event Triggered Execution:Component Object Model Hijacking,Exploitation for Privilege Escalation,Fallback Channels,Indicator Removal:File Deletion,Ingress Tool Transfer,Local Storage Discovery,Obfuscated Files or Information:Encrypted/Encoded File,Process Discovery,Process Injection,Scheduled Task/Job:Scheduled Task,Screen Capture,System Binary Proxy Execution:Rundll32,System Network Configuration Discovery
S0250Koadic[11]Abuse Elevation Control Mechanism:Bypass User Account Control,Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Clipboard Data,Command and Scripting Interpreter:Visual Basic,Command and Scripting Interpreter:PowerShell,Command and Scripting Interpreter:Windows Command Shell,Data from Local System,Encrypted Channel:Asymmetric Cryptography,File and Directory Discovery,Hide Artifacts:Hidden Window,Ingress Tool Transfer,Network Service Discovery,Network Share Discovery,OS Credential Dumping:Security Account Manager,OS Credential Dumping:NTDS,Process Injection:Dynamic-link Library Injection,Remote Services:Remote Desktop Protocol,Scheduled Task/Job:Scheduled Task,System Binary Proxy Execution:Mshta,System Binary Proxy Execution:Regsvr32,System Binary Proxy Execution:Rundll32,System Information Discovery,System Network Configuration Discovery,System Owner/User Discovery,System Services:Service Execution,Windows Management Instrumentation
S0162Komplex[49][55][16]Application Layer Protocol:Web Protocols,Create or Modify System Process:Launch Agent,Encrypted Channel:Symmetric Cryptography,Hide Artifacts:Hidden Files and Directories,Indicator Removal:File Deletion,Process Discovery,System Owner/User Discovery
S0397LoJax[48]Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Hide Artifacts:NTFS File Attributes,Modify Registry,Pre-OS Boot:System Firmware,Rootkit
S0002Mimikatz[19]Access Token Manipulation:SID-History Injection,Account Manipulation,Boot or Logon Autostart Execution:Security Support Provider,Credentials from Password Stores,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores:Windows Credential Manager,OS Credential Dumping:DCSync,OS Credential Dumping:Security Account Manager,OS Credential Dumping:LSASS Memory,OS Credential Dumping:LSA Secrets,Rogue Domain Controller,Steal or Forge Authentication Certificates,Steal or Forge Kerberos Tickets:Golden Ticket,Steal or Forge Kerberos Tickets:Silver Ticket,Unsecured Credentials:Private Keys,Use Alternate Authentication Material:Pass the Hash,Use Alternate Authentication Material:Pass the Ticket
S0039Net[2]Account Discovery:Domain Account,Account Discovery:Local Account,Account Manipulation:Additional Local or Domain Groups,Create Account:Local Account,Create Account:Domain Account,Indicator Removal:Network Share Connection Removal,Network Share Discovery,Password Policy Discovery,Permission Groups Discovery:Domain Groups,Permission Groups Discovery:Local Groups,Remote Services:SMB/Windows Admin Shares,Remote System Discovery,System Network Connections Discovery,System Service Discovery,System Services:Service Execution,System Time Discovery
S0108netshAPT28[27]
APT28 Nearest Neighbor Campaign[27]
Event Triggered Execution:Netsh Helper DLL,Impair Defenses:Disable or Modify System Firewall,Proxy,Software Discovery:Security Software Discovery
S0138OLDBAIT[6]Application Layer Protocol:Mail Protocols,Application Layer Protocol:Web Protocols,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores,Masquerading:Match Legitimate Resource Name or Location,Obfuscated Files or Information
S1187reGeorg[56]Application Layer Protocol:Web Protocols,Command and Scripting Interpreter:Python,Ingress Tool Transfer,Non-Application Layer Protocol,Protocol Tunneling,Proxy,Remote Services:Remote Desktop Protocol,Remote Services:SSH,Remote Services:SMB/Windows Admin Shares,Server Software Component:Web Shell
S0174Responder[40][14]Adversary-in-the-Middle:LLMNR/NBT-NS Poisoning and SMB Relay,Network Sniffing
S0183Tor[2]Encrypted Channel:Asymmetric Cryptography,Proxy:Multi-hop Proxy
S0136USBStealer[20]Automated Collection,Automated Exfiltration,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Communication Through Removable Media,Data from Removable Media,Data Staged:Local Data Staging,Exfiltration Over Physical Medium:Exfiltration over USB,File and Directory Discovery,Indicator Removal:Timestomp,Indicator Removal:File Deletion,Masquerading:Match Legitimate Resource Name or Location,Obfuscated Files or Information:Encrypted/Encoded File,Peripheral Device Discovery,Replication Through Removable Media
S0645Wevtutil[5]Data from Local System,Impair Defenses:Disable Windows Event Logging,Indicator Removal:Clear Windows Event Logs
S0191Winexe[36][16]System Services:Service Execution
S0314X-Agent for Android[57]Location Tracking,Masquerading:Match Legitimate Name or Location
S0161XAgentOSX[49][12][14]Application Layer Protocol:File Transfer Protocols,Credentials from Password Stores:Credentials from Web Browsers,File and Directory Discovery,Indicator Removal:File Deletion,Input Capture:Keylogging,Native API,Process Discovery,Screen Capture,System Information Discovery,System Owner/User Discovery
S0117XTunnel[20][12][14][16]Command and Scripting Interpreter:Windows Command Shell,Encrypted Channel:Asymmetric Cryptography,Fallback Channels,Network Service Discovery,Obfuscated Files or Information:Junk Code Insertion,Obfuscated Files or Information,Proxy,Unsecured Credentials:Credentials In Files
S0251Zebrocy[11][33][22][51][13]Application Layer Protocol:Mail Protocols,Application Layer Protocol:Web Protocols,Archive Collected Data,Automated Collection,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Boot or Logon Initialization Scripts:Logon Script (Windows),Command and Scripting Interpreter:Windows Command Shell,Credentials from Password Stores:Credentials from Web Browsers,Data Encoding:Standard Encoding,Data Staged:Local Data Staging,Deobfuscate/Decode Files or Information,Encrypted Channel:Asymmetric Cryptography,Exfiltration Over C2 Channel,File and Directory Discovery,Indicator Removal:File Deletion,Ingress Tool Transfer,Input Capture:Credential API Hooking,Local Storage Discovery,Network Share Discovery,Obfuscated Files or Information:Software Packing,Peripheral Device Discovery,Process Discovery,Query Registry,Scheduled Task/Job:Scheduled Task,Screen Capture,System Information Discovery,System Network Configuration Discovery,System Network Connections Discovery,System Owner/User Discovery,System Time Discovery,Windows Management Instrumentation

References

  1. NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020.
  2. NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.
  3. Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved November 17, 2024.
  4. Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.
  5. Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
  6. FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.
  7. SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.
  8. FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved November 17, 2024.
  9. Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.
  10. Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.
  11. Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.
  12. Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.
  13. ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.
  14. Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.
  15. Secureworks CTU. (n.d.). IRON TWILIGHT. Retrieved February 28, 2022.
  16. Secureworks CTU. (2017, March 30). IRON TWILIGHT Supports Active Measures. Retrieved February 28, 2022.
  17. Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.
  18. Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.
  19. Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
  20. ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.
  21. Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.
  22. Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.
  23. MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.
  24. Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.
  25. Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.
  26. Billy Leonard. (2023, April 19). Ukraine remains Russia’s biggest cyber focus in 2023. Retrieved March 1, 2024.
  27. Koessel, Sean. Adair, Steven. Lancaster, Tom. (2024, November 22). The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access. Retrieved February 25, 2025.
  28. FireEye Labs. (2015, April 18). Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack. Retrieved April 24, 2017.
  29. Huntley, S. (2022, March 7). An update on the threat landscape. Retrieved March 16, 2022.
  1. Hacquebord, F. (n.d.). Pawn Storm in 2019 A Year of Scanning and Credential Phishing on High-Profile Targets. Retrieved December 29, 2020.
  2. Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.
  3. Burt, T. (2020, September 10). New cyberattacks targeting U.S. elections. Retrieved March 24, 2021.
  4. Falcone, R., Lee, B. (2018, November 20). Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan. Retrieved November 26, 2018.
  5. Anthe, C. et al. (2015, October 19). Microsoft Security Intelligence Report Volume 19. Retrieved December 23, 2015.
  6. Maccaglia, S. (2015, November 4). Evolving Threats: dissection of a CyberEspionage attack. Retrieved April 4, 2018.
  7. Guarnieri, C. (2015, June 19). Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag. Retrieved January 22, 2018.
  8. Lee, B, et al. (2018, February 28). Sofacy Attacks Multiple Government Entities. Retrieved March 15, 2018.
  9. ESET. (2016, October). En Route with Sednit - Part 1: Approaching the Target. Retrieved November 8, 2016.
  10. Bitdefender. (2015, December). APT28 Under the Scope. Retrieved February 23, 2017.
  11. Smith, L. and Read, B.. (2017, August 11). APT28 Targets Hospitality Sector, Presents Threat to Travelers. Retrieved November 17, 2024.
  12. Microsoft. (2017, March 14). Microsoft Security Bulletin MS17-010 - Critical. Retrieved August 17, 2017.
  13. Microsoft Threat Intelligence. (2024, February 14). Staying ahead of threat actors in the age of AI. Retrieved March 11, 2024.
  14. OpenAI. (2024, February 14). Disrupting malicious uses of AI by state-affiliated threat actors. Retrieved September 12, 2024.
  15. Sherstobitoff, R., Rea, M. (2017, November 7). Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack. Retrieved November 21, 2017.
  16. Paganini, P. (2017, November 9). Russia-Linked APT28 group observed using DDE attack to deliver malware. Retrieved November 21, 2017.
  17. Falcone, R. (2016, July 20). Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks. Retrieved July 3, 2017.
  18. ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.
  19. ESET. (2018, September). LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit group. Retrieved July 2, 2019.
  20. Robert Falcone. (2017, February 14). XAgentOSX: Sofacy's Xagent macOS Tool. Retrieved July 12, 2017.
  21. Hacquebord, F.. (2017, April 25). Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks. Retrieved October 4, 2019.
  22. Lee, B., Falcone, R. (2018, December 12). Dear Joohn: The Sofacy Group’s Global Campaign. Retrieved April 19, 2019.
  23. Hacquebord, F.. (2017, April 25). Two Years of Pawn Storm: Examining an Increasingly Relevant Threat. Retrieved May 3, 2017.
  24. U.S. Department of Justice. (2018, October 4). U.S. Charges Russian GRU Officers with International Hacking and Related Influence and Disinformation Operations. Retrieved February 25, 2025.
  25. Bryan Lee and Rob Downs. (2016, February 12). A Look Into Fysbis: Sofacy’s Linux Backdoor. Retrieved September 10, 2017.
  26. Dani Creus, Tyler Halfpop, Robert Falcone. (2016, September 26). Sofacy's 'Komplex' OS X Trojan. Retrieved July 8, 2017.
  27. Paganini, P. (2023, October 27). France agency ANSSI warns of Russia-linked APT28 attacks on French entities. Retrieved December 3, 2024.
  28. CrowdStrike Global Intelligence Team. (2016). Use of Fancy Bear Android Malware in Tracking of Ukrainian FIeld Artillery Units. Retrieved February 6, 2017.
×

[8]ページ先頭

©2009-2026 Movatter.jp