🇰🇷

APT-C-60

APT Group Information theft and espionage 3 zero-day CVEs ETDA ✓

Also Known As 1 names

APT-Q-12

Target Countries 9

Countries highlighted in red

China Japan Democratic People's Republic of Korea Republic of Korea Mexico Thailand Province of China Taiwan United States Vietnam

Details

Origin 🇰🇷 KR
Last Updated 22 Jul 2023

MITRE ATT&CK 35

T1021.006 - Windows Remote Management T1027 - Obfuscated Files or Information T1036 - Masquerading T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.005 - Visual Basic T1070.004 - File Deletion T1071 - Application Layer Protocol T1071.001 T1082 - System Information Discovery T1083 - File and Directory Discovery T1102 - Web Service T1102.002 - Bidirectional Communication T1105 - Ingress Tool Transfer T1106 - Native API T1113 - Screen Capture T1132.001 - Standard Encoding T1134.002 T1140 - Deobfuscate/Decode Files or Information T1203 - Exploitation for Client Execution T1204 - User Execution T1204.001 - Malicious Link T1204.002 - Malicious File T1218 - Signed Binary Proxy Execution T1218.011 - Rundll32 T1547.001 - Registry Run Keys / Startup Folder T1553.005 - Mark-of-the-Web Bypass T1562.001 - Disable or Modify Tools T1566 - Phishing T1566.001 - Spearphishing Attachment T1573 - Encrypted Channel T1583.001 - Domains T1583.004 - Server T1587.004 - Exploits T1608.001 - Upload Malware