🇨🇳

Carderbee

APT Group Information theft and espionage ETDA ✓

Also Known As

No alias recorded

Target Countries 2

Countries highlighted in red

Hong Kong United States

Details

Origin 🇨🇳 CN
Last Updated 08 Nov 2023

MITRE ATT&CK 26

T1012 - Query Registry T1016 - System Network Configuration Discovery T1027 - Obfuscated Files or Information T1033 - System Owner/User Discovery T1049 - System Network Connections Discovery T1055 - Process Injection T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.003 - Windows Command Shell T1071.001 - Web Protocols T1082 - System Information Discovery T1083 - File and Directory Discovery T1102.002 - Bidirectional Communication T1105 - Ingress Tool Transfer T1106 - Native API T1124 - System Time Discovery T1140 - Deobfuscate/Decode Files or Information T1204 - User Execution T1204.001 T1204.002 - Malicious File T1547.001 - Registry Run Keys / Startup Folder T1566 - Phishing T1573 - Encrypted Channel T1573.002 - Asymmetric Cryptography T1574 - Hijack Execution Flow T1574.002 - DLL Side-Loading

Related Zero-Days

No zero-day CVE linked to this actor