🇵🇰
Operation RusticWeb
APT Group
Information theft and espionage
ETDA ✓
Also Known As
No alias recordedTarget Countries 5
Countries highlighted in red
Afghanistan
Bangladesh
United Kingdom
India
United States
Details
Origin
🇵🇰 PK
Last Updated
11 May 2024
MITRE ATT&CK 49
T1005 - Data from Local System
T1016
T1027 - Obfuscated Files or Information
T1036 - Masquerading
T1036.005
T1041 - Exfiltration Over C2 Channel
T1055 - Process Injection
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.001 - PowerShell
T1059.005 - Visual Basic
T1070 - Indicator Removal on Host
T1071
T1071.001 - Web Protocols
T1078
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1095 - Non-Application Layer Protocol
T1105 - Ingress Tool Transfer
T1106
T1112 - Modify Registry
T1113 - Screen Capture
T1115 - Clipboard Data
T1202 - Indirect Command Execution
T1204
T1204.002
T1218
T1218.005 - Mshta
T1497 - Virtualization/Sandbox Evasion
T1518
T1518.001 - Security Software Discovery
T1539 - Steal Web Session Cookie
T1547.001 - Registry Run Keys / Startup Folder
T1555 - Credentials from Password Stores
T1560 - Archive Collected Data
T1564.001 - Hidden Files and Directories
T1565.001 - Stored Data Manipulation
T1566
T1566.001 - Spearphishing Attachment
T1573 - Encrypted Channel
T1574
T1574.001
T1584
T1584.001
T1598
T1598.002
T1608
T1608.001
T1614