Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. APT42

APT42

APT42 is an Iranian-sponsored threat group that conducts cyber espionage and surveillance.[1] The group primarily focuses on targets in the Middle East region, but has targeted a variety of industries and countries since at least 2015.[1]APT42 starts cyber operations through spearphishing emails and/or the PINEFLOWER Android malware, then monitors and collects information from the compromised systems and devices.[1] Finally,APT42 exfiltrates data using native features and open-source tools.[2]

APT42 activities have been linked toMagic Hound by other commercial vendors. While there are behavior and software overlaps betweenMagic Hound andAPT42, they appear to be distinct entities and are tracked as separate entities by their originating vendor.

ID: G1044
Contributors: Sittikorn Sangrattanapitak
Version: 1.0
Created: 08 January 2025
Last Modified: 08 March 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.001Account Discovery:Local Account

APT42 has used the PowerShell-based POWERPOST script to collect local account names from the victim machine.[1]

EnterpriseT1583.001Acquire Infrastructure:Domains

APT42 has registered domains, several of which masqueraded as news outlets and login services, for use in operations.[1][3]

.003Acquire Infrastructure:Virtual Private Server

APT42 has used anonymized infrastructure and Virtual Private Servers (VPSs) to interact with the victim’s environment.[1][2]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

APT42 has used tools such asNICECURL with command and control communication taking place over HTTPS.[2]

EnterpriseT1547Boot or Logon Autostart Execution

APT42 has modified the Registry to maintain persistence.[1]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

APT42 has downloaded and executed PowerShell payloads.[1]

.005Command and Scripting Interpreter:Visual Basic

APT42 has used a VBScript to query anti-virus products.[2]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

APT42 has used custom malware to steal credentials.[1]

EnterpriseT1132.001Data Encoding:Standard Encoding

APT42 has encoded C2 traffic with Base64.[2]

EnterpriseT1530Data from Cloud Storage

APT42 has collected data from Microsoft 365 environments.[2][1]

EnterpriseT1573.002Encrypted Channel:Asymmetric Cryptography

APT42 has used tools such asNICECURL with command and control communication taking place over HTTPS.[2]

EnterpriseT1585.002Establish Accounts:Email Accounts

APT42 has created email accounts to use in spearphishing operations.[3]

EnterpriseT1656Impersonation

APT42 has impersonated legitimate people in phishing emails to gain credentials.[1][3]

EnterpriseT1070Indicator Removal

APT42 has cleared Chrome browser history.[2]

.008Clear Mailbox Data

APT42 has deleted login notification emails and has cleared the Sent folder to cover their tracks.[1]

EnterpriseT1056Input Capture

APT42 has used credential harvesting websites.[2]

.001Keylogging

APT42 has used custom malware to log keystrokes.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

APT42 has masqueraded the VINETHORN payload as a VPN application.[1]

EnterpriseT1112Modify Registry

APT42 has modified Registry keys to maintain persistence.[1]

EnterpriseT1111Multi-Factor Authentication Interception

APT42 has intercepted SMS-based one-time passwords and has set up two-factor authentication.[1] Additionally,APT42 has used cloned or fake websites to capture MFA tokens.[2]

EnterpriseT1588.002Obtain Capabilities:Tool

APT42 has used built-in features in the Microsoft 365 environment and publicly available tools to avoid detection.[2]

EnterpriseT1566.002Phishing:Spearphishing Link

APT42 has sent spearphishing emails containing malicious links.[1][2][3]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

APT42 has used scheduled tasks for persistence.[1]

EnterpriseT1113Screen Capture

APT42 has used malware, such as GHAMBAR and POWERPOST, to take screenshots.[1]

EnterpriseT1518.001Software Discovery:Security Software Discovery

APT42 has used Windows Management Instrumentation (WMI) to check for anti-virus products.[2]

EnterpriseT1608.001Stage Capabilities:Upload Malware

APT42 has used its infrastructure for C2 and for staging the VINETHORN payload, which masqueraded as a VPN application.[1]

EnterpriseT1539Steal Web Session Cookie

APT42 has used custom malware to steal login and cookie data from common browsers.[1]

EnterpriseT1082System Information Discovery

APT42 has used malware, such as GHAMBAR and POWERPOST, to collect system information.[1]

EnterpriseT1016System Network Configuration Discovery

APT42 has used malware, such as GHAMBAR and POWERPOST, to collect network information.[1]

EnterpriseT1102Web Service

APT42 has used various links, such as links with typo-squatted domains, links to Dropbox files and links to fake Google sites, in spearphishing operations.[2][1][3]

EnterpriseT1047Windows Management Instrumentation

APT42 has used Windows Management Instrumentation (WMI) to query anti-virus products.[2]

Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp