🇨🇳

GhostR

APT Group 10 zero-day CVEs ETDA ✓

Also Known As

No alias recorded

Target Countries 2

Countries highlighted in red

Denmark United States

Details

Origin 🇨🇳 CN
Last Updated 13 Apr 2026

MITRE ATT&CK 60

T1005 - Data from Local System T1008 - Fallback Channels T1012 - Query Registry T1014 - Rootkit T1016 - System Network Configuration Discovery T1016.001 - Internet Connection Discovery T1027 - Obfuscated Files or Information T1036 - Masquerading T1041 - Exfiltration Over C2 Channel T1047 - Windows Management Instrumentation T1053.005 - Scheduled Task T1055 - Process Injection T1056 - Input Capture T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.003 T1069 - Permission Groups Discovery T1069.002 - Domain Groups T1071 - Application Layer Protocol T1071.001 - Web Protocols T1071.004 - DNS T1078.004 - Cloud Accounts T1083 - File and Directory Discovery T1102 - Web Service T1104 - Multi-Stage Channels T1105 - Ingress Tool Transfer T1106 - Native API T1113 - Screen Capture T1115 - Clipboard Data T1116 - Code Signing T1134 - Access Token Manipulation T1140 - Deobfuscate/Decode Files or Information T1176 - Browser Extensions T1189 - Drive-by Compromise T1190 T1195 - Supply Chain Compromise T1204 - User Execution T1218 - Signed Binary Proxy Execution T1456 - Drive-by Compromise T1480 - Execution Guardrails T1496 - Resource Hijacking T1546 - Event Triggered Execution T1547 - Boot or Logon Autostart Execution T1553 - Subvert Trust Controls T1553.002 - Code Signing T1562 - Impair Defenses T1562.001 - Disable or Modify Tools T1564 - Hide Artifacts T1566 - Phishing T1568 - Dynamic Resolution T1568.002 - Domain Generation Algorithms T1573 - Encrypted Channel T1574 - Hijack Execution Flow T1583 - Acquire Infrastructure T1583.001 - Domains T1583.004 - Server T1584.003 - Virtual Private Server T1584.005 - Botnet T1590 - Gather Victim Network Information T1598 - Phishing for Information