🇷🇺
TA571
APT Group
5 zero-day CVEs
ETDA ✓
Also Known As
No alias recordedTarget Countries 1
Countries highlighted in red
United States
Details
Origin
🇷🇺 RU
Last Updated
21 Jun 2024
MITRE ATT&CK 49
T1003 - OS Credential Dumping
T1018
T1027 - Obfuscated Files or Information
T1027.003
T1027.010
T1028 - Windows Remote Management
T1036
T1045 - Software Packing
T1053 - Scheduled Task/Job
T1053.005 - Scheduled Task
T1055 - Process Injection
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.001 - PowerShell
T1059.003
T1060 - Registry Run Keys / Startup Folder
T1069 - Permission Groups Discovery
T1071 - Application Layer Protocol
T1071.001 - Web Protocols
T1082 - System Information Discovery
T1104 - Multi-Stage Channels
T1105 - Ingress Tool Transfer
T1113 - Screen Capture
T1115 - Clipboard Data
T1119 - Automated Collection
T1129 - Shared Modules
T1132
T1132.001
T1143 - Hidden Window
T1193 - Spearphishing Attachment
T1204
T1204.002 - Malicious File
T1218
T1218.005
T1218.010
T1218.011
T1457 - Malicious Media Content
T1480 - Execution Guardrails
T1486 - Data Encrypted for Impact
T1553 - Subvert Trust Controls
T1557.002 - ARP Cache Poisoning
T1566 - Phishing
T1566.001
T1566.002 - Spearphishing Link
T1568
T1568.002
T1574 - Hijack Execution Flow
T1589
T1589.002