Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. LAPSUS$

LAPSUS$

LAPSUS$ is cyber criminal threat group that has been active since at least mid-2021.LAPSUS$ specializes in large-scale social engineering and extortion operations, including destructive attacks without the use of ransomware. The group has targeted organizations globally, including in the government, manufacturing, higher education, energy, healthcare, technology, telecommunications, and media sectors.[1][2][3]

ID: G1004
Associated Groups: DEV-0537, Strawberry Tempest
Contributors: David Hughes, BT Security; Matt Brenton, Zurich Insurance Group; Flávio Costa, @Segurança Descomplicada; Caio Silva
Version: 2.1
Created: 09 June 2022
Last Modified: 21 April 2025

Associated Group Descriptions

NameDescription
DEV-0537

[2]

Strawberry Tempest

[4]

Enterprise Layer
downloadview
Mobile Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1531Account Access Removal

LAPSUS$ has removed a targeted organization's global admin accounts to lock the organization out of all access.[2]

EnterpriseT1087.002Account Discovery:Domain Account

LAPSUS$ has used the AD Explorer tool to enumerate users on a victim's network.[2][5]

EnterpriseT1098.003Account Manipulation:Additional Cloud Roles

LAPSUS$ has added the global admin role to accounts they have created in the targeted organization's cloud instances.[2]

EnterpriseT1583.003Acquire Infrastructure:Virtual Private Server

LAPSUS$ has used VPS hosting providers for infrastructure.[2]

EnterpriseT1586.002Compromise Accounts:Email Accounts

LAPSUS$ has payed employees, suppliers, and business partners of target organizations for credentials.[2][5]

EnterpriseT1584.002Compromise Infrastructure:DNS Server

LAPSUS$ has reconfigured a victim's DNS records to actor-controlled domains and websites.[5]

EnterpriseT1136.003Create Account:Cloud Account

LAPSUS$ has created global admin accounts in the targeted organization's cloud instances to gain persistence.[2]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

LAPSUS$ has obtained passwords and session tokens with the use of the Redline password stealer.[2]

.005Credentials from Password Stores:Password Managers

LAPSUS$ has accessed local password managers and databases to obtain further credentials from a compromised network.[5]

EnterpriseT1485Data Destruction

LAPSUS$ has deleted the target's systems and resources both on-premises and in the cloud.[2][5]

EnterpriseT1213.001Data from Information Repositories:Confluence

LAPSUS$ has searched a victim's network for collaboration platforms like Confluence and JIRA to discover further high-privilege account credentials.[2]

.002Data from Information Repositories:Sharepoint

LAPSUS$ has searched a victim's network for collaboration platforms like SharePoint to discover further high-privilege account credentials.[2][5]

.003Data from Information Repositories:Code Repositories

LAPSUS$ has searched a victim's network for code repositories like GitLab and GitHub to discover further high-privilege account credentials.[2][5]

.005Data from Information Repositories:Messaging Applications

LAPSUS$ has searched a victim's network for organization collaboration channels like MS Teams or Slack to discover further high-privilege account credentials.[2]

EnterpriseT1005Data from Local System

LAPSUS$ uploaded sensitive files, information, and credentials from a targeted organization for extortion or public release.[2]

EnterpriseT1114.003Email Collection:Email Forwarding Rule

LAPSUS$ has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account.[2]

EnterpriseT1068Exploitation for Privilege Escalation

LAPSUS$ has exploited unpatched vulnerabilities on internally accessible servers including JIRA, GitLab, and Confluence for privilege escalation.[2]

EnterpriseT1133External Remote Services

LAPSUS$ has gained access to internet-facing systems and applications, including virtual private network (VPN), remote desktop protocol (RDP), and virtual desktop infrastructure (VDI) including Citrix.[2][5]

EnterpriseT1589Gather Victim Identity Information

LAPSUS$ has gathered detailed information of target employees to enhance their social engineering lures.[2]

.001Credentials

LAPSUS$ has gathered user identities and credentials to gain initial access to a victim's organization; the group has also called an organization's help desk to reset a target's credentials.[2][5]

.002Email Addresses

LAPSUS$ has gathered employee email addresses, including personal accounts, for social engineering and initial access efforts.[2]

EnterpriseT1591.002Gather Victim Org Information:Business Relationships

LAPSUS$ has gathered detailed knowledge of an organization's supply chain relationships.[2]

.004Gather Victim Org Information:Identify Roles

LAPSUS$ has gathered detailed knowledge of team structures within a target organization.[2]

EnterpriseT1656Impersonation

LAPSUS$ has called victims' help desk and impersonated legitimate users with previously gathered information in order to gain access to privileged accounts.[2]

EnterpriseT1578.002Modify Cloud Compute Infrastructure:Create Cloud Instance

LAPSUS$ has created new virtual machines within the target's cloud environment after leveraging credential access to cloud assets.[2]

.003Modify Cloud Compute Infrastructure:Delete Cloud Instance

LAPSUS$ has deleted the target's systems and resources in the cloud to trigger the organization's incident and crisis response process.[2]

EnterpriseT1111Multi-Factor Authentication Interception

LAPSUS$ has replayed stolen session token and passwords to trigger simple-approval MFA prompts in hope of the legitimate user will grant necessary approval.[2]

EnterpriseT1621Multi-Factor Authentication Request Generation

LAPSUS$ has spammed target users with MFA prompts in the hope that the legitimate user will grant necessary approval.[2]

EnterpriseT1588.001Obtain Capabilities:Malware

LAPSUS$ acquired and used the Redline password stealer in their operations.[2]

.002Obtain Capabilities:Tool

LAPSUS$ has obtained tools such as RVTools and AD Explorer for their operations.[2][5]

EnterpriseT1003.003OS Credential Dumping:NTDS

LAPSUS$ has used Windows built-in toolntdsutil to extract the Active Directory (AD) database.[2]

.006OS Credential Dumping:DCSync

LAPSUS$ has used DCSync attacks to gather credentials for privilege escalation routines.[2]

EnterpriseT1069.002Permission Groups Discovery:Domain Groups

LAPSUS$ has used the AD Explorer tool to enumerate groups on a victim's network.[2]

EnterpriseT1598.004Phishing for Information:Spearphishing Voice

LAPSUS$ has called victims' help desk to convince the support personnel to reset a privileged account’s credentials.[2]

EnterpriseT1090Proxy

LAPSUS$ has leverage NordVPN for its egress points when targeting intended victims.[2]

EnterpriseT1597.002Search Closed Sources:Purchase Technical Data

LAPSUS$ has purchased credentials and session tokens from criminal underground forums.[2]

EnterpriseT1593.003Search Open Websites/Domains:Code Repositories

LAPSUS$ has searched public code repositories for exposed credentials.[2]

EnterpriseT1489Service Stop

LAPSUS$ has shut down virtual machines from within a victim's on-premise VMware ESXi infrastructure.[5]

EnterpriseT1199Trusted Relationship

LAPSUS$ has accessed internet-facing identity providers such as Azure Active Directory and Okta to target specific organizations.[2]

EnterpriseT1552.008Unsecured Credentials:Chat Messages

LAPSUS$ has targeted various collaboration tools like Slack, Teams, JIRA, Confluence, and others to hunt for exposed credentials to support privilege escalation and lateral movement.[2]

EnterpriseT1204User Execution

LAPSUS$ has recruited target organization employees or contractors who provide credentials and approve an associated MFA prompt, or install remote management software onto a corporate workstation, allowingLAPSUS$ to take control of an authenticated system.[2]

EnterpriseT1078Valid Accounts

LAPSUS$ has used compromised credentials and/or session tokens to gain access into a victim's VPN, VDI, RDP, and IAMs.[2][5]

.004Cloud Accounts

LAPSUS$ has used compromised credentials to access cloud assets within a target organization.[2]

MobileT1451SIM Card Swap

LAPSUS$ has used SIM swapping to gain access to victims’ mobile devices.[6][7]

Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp