🇨🇳
IronHusky
APT Group
Information theft and espionage
3 zero-day CVEs
ETDA ✓
Also Known As
No alias recordedTarget Countries 1
Countries highlighted in red
Mongolia
Sectors Targeted
Defense
Financial
Government
Details
Origin
🇨🇳 CN
Last Updated
08 Nov 2023
MITRE ATT&CK 36
T1027 - Obfuscated Files or Information
T1036 - Masquerading
T1040 - Network Sniffing
T1049 - System Network Connections Discovery
T1053 - Scheduled Task/Job
T1055 - Process Injection
T1056 - Input Capture
T1059 - Command and Scripting Interpreter
T1059.001
T1059.004 - Unix Shell
T1059.007 - JavaScript
T1070 - Indicator Removal on Host
T1071.001
T1078
T1082 - System Information Discovery
T1090 - Proxy
T1102 - Web Service
T1104 - Multi-Stage Channels
T1106 - Native API
T1113 - Screen Capture
T1115 - Clipboard Data
T1134 - Access Token Manipulation
T1140 - Deobfuscate/Decode Files or Information
T1189 - Drive-by Compromise
T1195 - Supply Chain Compromise
T1495 - Firmware Corruption
T1496 - Resource Hijacking
T1525 - Implant Internal Image
T1530 - Data from Cloud Storage Object
T1547 - Boot or Logon Autostart Execution
T1553 - Subvert Trust Controls
T1562 - Impair Defenses
T1566 - Phishing
T1568 - Dynamic Resolution
T1574 - Hijack Execution Flow
T1588 - Obtain Capabilities