🇨🇳

IronHusky

APT Group Information theft and espionage 3 zero-day CVEs ETDA ✓

Also Known As

No alias recorded

Target Countries 1

Countries highlighted in red

Mongolia

Sectors Targeted

Defense Financial Government

Details

Origin 🇨🇳 CN
Last Updated 08 Nov 2023

MITRE ATT&CK 36

T1027 - Obfuscated Files or Information T1036 - Masquerading T1040 - Network Sniffing T1049 - System Network Connections Discovery T1053 - Scheduled Task/Job T1055 - Process Injection T1056 - Input Capture T1059 - Command and Scripting Interpreter T1059.001 T1059.004 - Unix Shell T1059.007 - JavaScript T1070 - Indicator Removal on Host T1071.001 T1078 T1082 - System Information Discovery T1090 - Proxy T1102 - Web Service T1104 - Multi-Stage Channels T1106 - Native API T1113 - Screen Capture T1115 - Clipboard Data T1134 - Access Token Manipulation T1140 - Deobfuscate/Decode Files or Information T1189 - Drive-by Compromise T1195 - Supply Chain Compromise T1495 - Firmware Corruption T1496 - Resource Hijacking T1525 - Implant Internal Image T1530 - Data from Cloud Storage Object T1547 - Boot or Logon Autostart Execution T1553 - Subvert Trust Controls T1562 - Impair Defenses T1566 - Phishing T1568 - Dynamic Resolution T1574 - Hijack Execution Flow T1588 - Obtain Capabilities