🇷🇺

TA571

APT Group 5 zero-day CVEs ETDA ✓

Also Known As

No alias recorded

Target Countries 1

Countries highlighted in red

United States

Details

Origin 🇷🇺 RU
Last Updated 21 Jun 2024

MITRE ATT&CK 49

T1003 - OS Credential Dumping T1018 T1027 - Obfuscated Files or Information T1027.003 T1027.010 T1028 - Windows Remote Management T1036 T1045 - Software Packing T1053 - Scheduled Task/Job T1053.005 - Scheduled Task T1055 - Process Injection T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 T1060 - Registry Run Keys / Startup Folder T1069 - Permission Groups Discovery T1071 - Application Layer Protocol T1071.001 - Web Protocols T1082 - System Information Discovery T1104 - Multi-Stage Channels T1105 - Ingress Tool Transfer T1113 - Screen Capture T1115 - Clipboard Data T1119 - Automated Collection T1129 - Shared Modules T1132 T1132.001 T1143 - Hidden Window T1193 - Spearphishing Attachment T1204 T1204.002 - Malicious File T1218 T1218.005 T1218.010 T1218.011 T1457 - Malicious Media Content T1480 - Execution Guardrails T1486 - Data Encrypted for Impact T1553 - Subvert Trust Controls T1557.002 - ARP Cache Poisoning T1566 - Phishing T1566.001 T1566.002 - Spearphishing Link T1568 T1568.002 T1574 - Hijack Execution Flow T1589 T1589.002