🇮🇷

Cyber Av3ngers

APT Group Sabotage and destruction 6 zero-day CVEs ETDA ✓

Details

Origin 🇮🇷 IR
Last Updated 13 Apr 2026

Malware Families 1

elf.iocontrol

MITRE ATT&CK 58

T1005 - Data from Local System T1016 - System Network Configuration Discovery T1021 - Remote Services T1027 - Obfuscated Files or Information T1027.002 - Software Packing T1036 - Masquerading T1046 - Network Service Scanning T1053.003 - Cron T1056 - Input Capture T1056.001 - Keylogging T1059 - Command and Scripting Interpreter T1059.004 - Unix Shell T1070.004 - File Deletion T1071 - Application Layer Protocol T1071.001 T1074 T1078 - Valid Accounts T1082 - System Information Discovery T1083 - File and Directory Discovery T1102 - Web Service T1102.002 - Bidirectional Communication T1104 - Multi-Stage Channels T1105 - Ingress Tool Transfer T1110 - Brute Force T1113 - Screen Capture T1114 - Email Collection T1132 - Data Encoding T1133 - External Remote Services T1140 - Deobfuscate/Decode Files or Information T1176 - Browser Extensions T1189 - Drive-by Compromise T1190 - Exploit Public-Facing Application T1192 - Spearphishing Link T1204 - User Execution T1491 - Defacement T1497 - Virtualization/Sandbox Evasion T1499 - Endpoint Denial of Service T1547.006 - Kernel Modules and Extensions T1555 - Credentials from Password Stores T1555.001 - Keychain T1555.003 - Credentials from Web Browsers T1560 - Archive Collected Data T1566 - Phishing T1566.002 T1571 - Non-Standard Port T1572 - Protocol Tunneling T1583 - Acquire Infrastructure T1583.001 - Domains T1583.003 - Virtual Private Server T1584 - Compromise Infrastructure T1587 - Develop Capabilities T1587.001 - Malware T1588 - Obtain Capabilities T1589 - Gather Victim Identity Information T1590 - Gather Victim Network Information T1591 - Gather Victim Org Information T1592 - Gather Victim Host Information T1595 - Active Scanning