🇰🇷
Stolen Pencil
APT Group
Information theft and espionage
2 zero-day CVEs
ETDA ✓
Also Known As
No alias recordedTarget Countries 20
Countries highlighted in red
Belgium
Canada
Germany
France
United Kingdom
India
Japan
Democratic People's Republic of Korea
Republic of Korea
Mexico
Malaysia
Netherlands
Poland
Russian Federation
Singapore
Slovakia
Thailand
United States
Vietnam
South Africa
Sectors Targeted
Religious, Grantmaking, Civic, Professional, and Similar Organizations
813
NAICS:31
31
Religious Organizations
8131
Health Care and Social Assistance
62
Grantmaking and Giving Services
8132
Computer Systems Design and Related Services
54151
Other Services (except Public Administration)
81
Educational Services
61
National Security and International Affairs
928
Computer Systems Design Services
541512
Data Processing, Hosting, and Related Services
518
Public Administration
92
Air Transportation
481
Educational Support Services
6117
Personal Care Services
8121
Professional, Scientific, and Technical Services
54
Hospitals
622
Chemical Manufacturing
325
Internet Publishing and Broadcasting and Web Search Portals
51913
Other Amusement and Recreation Industries
7139
National Security and International Affairs
9281
Data Processing, Hosting, and Related Services
51821
Offices of Physicians
6211
Space Research and Technology
927
Construction
23
Employment Placement Agencies and Executive Search Services
56131
Motion Picture and Video Production
51211
Business, Professional, Labor, Political, and Similar Organizations
8139
Administrative and Support Services
561
Finance and Insurance
52
Telecommunications
517
Software Publishers
5112
Arts, Entertainment, and Recreation
71
Research and Development in the Social Sciences and Humanities
54172
Utilities
22
Details
Origin
🇰🇷 KR
Last Updated
11 May 2024
MITRE ATT&CK 155
T1003 - OS Credential Dumping
T1003.001
T1005 - Data from Local System
T1007
T1012
T1016
T1021
T1021.001 - Remote Desktop Protocol
T1027 - Obfuscated Files or Information
T1027.001
T1027.002
T1027.010
T1027.012
T1027.016
T1033 - System Owner/User Discovery
T1036 - Masquerading
T1036.004
T1036.005 - Match Legitimate Name or Location
T1036.007
T1040
T1041
T1053 - Scheduled Task/Job
T1053.005 - Scheduled Task
T1055
T1055.012 - Process Hollowing
T1056 - Input Capture
T1056.001 - Keylogging
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.001 - PowerShell
T1059.003 - Windows Command Shell
T1059.005
T1059.006
T1059.007
T1070
T1070.004
T1070.006
T1071 - Application Layer Protocol
T1071.001 - Web Protocols
T1071.002
T1071.003
T1071.004 - DNS
T1074 - Data Staged
T1074.001
T1078 - Valid Accounts
T1078.003
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1090.003 - Multi-hop Proxy
T1098
T1098.007
T1102
T1102.001
T1102.002
T1105 - Ingress Tool Transfer
T1106 - Native API
T1111
T1112 - Modify Registry
T1113
T1114 - Email Collection
T1114.002
T1114.003
T1129 - Shared Modules
T1132 - Data Encoding
T1133 - External Remote Services
T1136
T1136.001
T1140 - Deobfuscate/Decode Files or Information
T1176
T1176.001
T1185
T1190 - Exploit Public-Facing Application
T1204 - User Execution
T1204.001
T1204.002 - Malicious File
T1205
T1218 - Signed Binary Proxy Execution
T1218.005
T1218.010
T1218.011
T1219
T1219.002
T1505
T1505.003
T1518
T1518.001
T1534
T1539
T1543
T1543.003
T1546 - Event Triggered Execution
T1546.001
T1547
T1547.001
T1550
T1550.002
T1552
T1552.001
T1553
T1553.002
T1555
T1555.003
T1557
T1560
T1560.001
T1560.003
T1562
T1562.001 - Disable or Modify Tools
T1562.004
T1564
T1564.002
T1564.003
T1566 - Phishing
T1566.001
T1566.002
T1567
T1567.002
T1568 - Dynamic Resolution
T1573 - Encrypted Channel
T1583
T1583.001
T1583.003 - Virtual Private Server
T1583.004
T1583.006
T1584
T1584.001
T1585
T1585.001
T1585.002
T1586
T1586.002
T1587
T1587.001
T1588 - Obtain Capabilities
T1588.002 - Tool
T1588.003
T1588.004 - Digital Certificates
T1588.005
T1589
T1589.002
T1589.003
T1591
T1593
T1593.001
T1593.002
T1594
T1596
T1598
T1598.003
T1608
T1608.001
T1620
T1656
T1657
T1680