🇨🇳
Operation Cobalt Whisper
APT Group
Financial crime
14 zero-day CVEs
ETDA ✓
Also Known As
No alias recordedTarget Countries
No target country recorded
Sectors Targeted
No targeted sector recordedDetails
Origin
🇨🇳 CN
Last Updated
13 Apr 2026
MITRE ATT&CK 138
T1003 - OS Credential Dumping
T1003.001 - LSASS Memory
T1005 - Data from Local System
T1007 - System Service Discovery
T1012 - Query Registry
T1016 - System Network Configuration Discovery
T1018 - Remote System Discovery
T1020 - Automated Exfiltration
T1021 - Remote Services
T1021.001
T1027 - Obfuscated Files or Information
T1027.010
T1033 - System Owner/User Discovery
T1036 - Masquerading
T1037
T1037.001
T1041 - Exfiltration Over C2 Channel
T1046 - Network Service Scanning
T1047 - Windows Management Instrumentation
T1048 - Exfiltration Over Alternative Protocol
T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol
T1049 - System Network Connections Discovery
T1053 - Scheduled Task/Job
T1053.005
T1055 - Process Injection
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.001 - PowerShell
T1059.003 - Windows Command Shell
T1059.004 - Unix Shell
T1059.005 - Visual Basic
T1059.006 - Python
T1059.007 - JavaScript
T1068 - Exploitation for Privilege Escalation
T1069 - Permission Groups Discovery
T1070 - Indicator Removal on Host
T1070.004 - File Deletion
T1070.006 - Timestomp
T1071 - Application Layer Protocol
T1071.001 - Web Protocols
T1071.004
T1074 - Data Staged
T1078 - Valid Accounts
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1087 - Account Discovery
T1090 - Proxy
T1095 - Non-Application Layer Protocol
T1098 - Account Manipulation
T1102 - Web Service
T1104 - Multi-Stage Channels
T1105 - Ingress Tool Transfer
T1106 - Native API
T1110 - Brute Force
T1112 - Modify Registry
T1115 - Clipboard Data
T1127 - Trusted Developer Utilities Proxy Execution
T1129 - Shared Modules
T1132 - Data Encoding
T1132.001 - Standard Encoding
T1134 - Access Token Manipulation
T1135 - Network Share Discovery
T1136 - Create Account
T1140 - Deobfuscate/Decode Files or Information
T1176 - Browser Extensions
T1189 - Drive-by Compromise
T1190 - Exploit Public-Facing Application
T1195 - Supply Chain Compromise
T1195.001 - Compromise Software Dependencies and Development Tools
T1195.002
T1199 - Trusted Relationship
T1203
T1204 - User Execution
T1204.001
T1204.002 - Malicious File
T1218 - Signed Binary Proxy Execution
T1218.003
T1218.008
T1218.010
T1219
T1220
T1221 - Template Injection
T1222 - File and Directory Permissions Modification
T1480 - Execution Guardrails
T1482 - Domain Trust Discovery
T1485 - Data Destruction
T1486 - Data Encrypted for Impact
T1489 - Service Stop
T1490 - Inhibit System Recovery
T1496 - Resource Hijacking
T1497 - Virtualization/Sandbox Evasion
T1505 - Server Software Component
T1505.003 - Web Shell
T1518 - Software Discovery
T1518.001
T1530 - Data from Cloud Storage Object
T1531 - Account Access Removal
T1543 - Create or Modify System Process
T1543.003
T1546 - Event Triggered Execution
T1547 - Boot or Logon Autostart Execution
T1547.001 - Registry Run Keys / Startup Folder
T1548
T1548.002
T1554 - Compromise Client Software Binary
T1555 - Credentials from Password Stores
T1559 - Inter-Process Communication
T1559.002
T1560 - Archive Collected Data
T1562 - Impair Defenses
T1563 - Remote Service Session Hijacking
T1564 - Hide Artifacts
T1566 - Phishing
T1566.001 - Spearphishing Attachment
T1566.002
T1567 - Exfiltration Over Web Service
T1569 - System Services
T1569.002 - Service Execution
T1570 - Lateral Tool Transfer
T1572 - Protocol Tunneling
T1573 - Encrypted Channel
T1573.001 - Symmetric Cryptography
T1573.002 - Asymmetric Cryptography
T1574 - Hijack Execution Flow
T1583 - Acquire Infrastructure
T1583.001 - Domains
T1583.003 - Virtual Private Server
T1586 - Compromise Accounts
T1586.002 - Email Accounts
T1587 - Develop Capabilities
T1588
T1588.002
T1590 - Gather Victim Network Information
T1595 - Active Scanning
T1595.002 - Vulnerability Scanning
T1601 - Modify System Image
T1610 - Deploy Container
T1614 - System Location Discovery