🇰🇷
APT-C-60
APT Group
Information theft and espionage
3 zero-day CVEs
ETDA ✓
Also Known As 1 names
APT-Q-12
Target Countries 9
Countries highlighted in red
China
Japan
Democratic People's Republic of Korea
Republic of Korea
Mexico
Thailand
Province of China Taiwan
United States
Vietnam
Details
Origin
🇰🇷 KR
Last Updated
22 Jul 2023
MITRE ATT&CK 35
T1021.006 - Windows Remote Management
T1027 - Obfuscated Files or Information
T1036 - Masquerading
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.005 - Visual Basic
T1070.004 - File Deletion
T1071 - Application Layer Protocol
T1071.001
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1102 - Web Service
T1102.002 - Bidirectional Communication
T1105 - Ingress Tool Transfer
T1106 - Native API
T1113 - Screen Capture
T1132.001 - Standard Encoding
T1134.002
T1140 - Deobfuscate/Decode Files or Information
T1203 - Exploitation for Client Execution
T1204 - User Execution
T1204.001 - Malicious Link
T1204.002 - Malicious File
T1218 - Signed Binary Proxy Execution
T1218.011 - Rundll32
T1547.001 - Registry Run Keys / Startup Folder
T1553.005 - Mark-of-the-Web Bypass
T1562.001 - Disable or Modify Tools
T1566 - Phishing
T1566.001 - Spearphishing Attachment
T1573 - Encrypted Channel
T1583.001 - Domains
T1583.004 - Server
T1587.004 - Exploits
T1608.001 - Upload Malware