🇨🇳
GhostR
APT Group
10 zero-day CVEs
ETDA ✓
Also Known As
No alias recordedTarget Countries 2
Countries highlighted in red
Denmark
United States
Details
Origin
🇨🇳 CN
Last Updated
13 Apr 2026
MITRE ATT&CK 60
T1005 - Data from Local System
T1008 - Fallback Channels
T1012 - Query Registry
T1014 - Rootkit
T1016 - System Network Configuration Discovery
T1016.001 - Internet Connection Discovery
T1027 - Obfuscated Files or Information
T1036 - Masquerading
T1041 - Exfiltration Over C2 Channel
T1047 - Windows Management Instrumentation
T1053.005 - Scheduled Task
T1055 - Process Injection
T1056 - Input Capture
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.003
T1069 - Permission Groups Discovery
T1069.002 - Domain Groups
T1071 - Application Layer Protocol
T1071.001 - Web Protocols
T1071.004 - DNS
T1078.004 - Cloud Accounts
T1083 - File and Directory Discovery
T1102 - Web Service
T1104 - Multi-Stage Channels
T1105 - Ingress Tool Transfer
T1106 - Native API
T1113 - Screen Capture
T1115 - Clipboard Data
T1116 - Code Signing
T1134 - Access Token Manipulation
T1140 - Deobfuscate/Decode Files or Information
T1176 - Browser Extensions
T1189 - Drive-by Compromise
T1190
T1195 - Supply Chain Compromise
T1204 - User Execution
T1218 - Signed Binary Proxy Execution
T1456 - Drive-by Compromise
T1480 - Execution Guardrails
T1496 - Resource Hijacking
T1546 - Event Triggered Execution
T1547 - Boot or Logon Autostart Execution
T1553 - Subvert Trust Controls
T1553.002 - Code Signing
T1562 - Impair Defenses
T1562.001 - Disable or Modify Tools
T1564 - Hide Artifacts
T1566 - Phishing
T1568 - Dynamic Resolution
T1568.002 - Domain Generation Algorithms
T1573 - Encrypted Channel
T1574 - Hijack Execution Flow
T1583 - Acquire Infrastructure
T1583.001 - Domains
T1583.004 - Server
T1584.003 - Virtual Private Server
T1584.005 - Botnet
T1590 - Gather Victim Network Information
T1598 - Phishing for Information