🇮🇹
AzzaSec
APT Group
Also Known As
No alias recordedTarget Countries
No target country recorded
Sectors Targeted
No targeted sector recordedDetails
Origin
🇮🇹 IT
Last Updated
26 Mar 2025
MITRE ATT&CK 33
T027 - Obfuscated Files or Information
T027.001 - Obfuscated Files or Information Binary Padding
T036 - Masquerading
T1021.001 - Remote Services Remote Desktop Protocol
T1041 - Exfiltration Over C Channel
T1059.001 - Command and Scripting Interpreter PowerShell
T1059.003 - Command and Scripting Interpreter Windows Command Shell
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1090.002 - Web Service
T1098 - Account Manipulation
T1124 - System Time Discovery
T1190 - Exploit Public Facing Application
T1485 - Data Destruction
T1486 - Data Encrypted for Impact
T1497.001 - Virtualization Sandbox Evasion System Checks
T1498 - Network Denial of Service
T1539 - Steal Web Session Cookie
T1547.001 - Boot or Logon Autostart Execution Registry Run Keys Startup Folder
T1548.002 - Abuse Elevation Control Mechanism Bypass UAC
T1562.001 - Impair Defenses Disable or Modify Tools
T1589 - Gather Victim Identity Information
T1591 - Gather Victim Org Information
T1592 - Gather Victim Host Information
T1594 - Search Victim Owned Websites
T1595.002 - Active Scanning Vulnerability Scanning
T1595.003 - Active Scanning Wordlist Scanning
T1596 - Search Open Technical Databases
T1598.002 - Phishing for Information Spearphishing Attachment
T1614 - System Location Discovery
T1622 - Deobfuscate Decode Files or Information
T1657 - Financial Theft
T1659 - Content Injection