🇮🇹

AzzaSec

APT Group

Also Known As

No alias recorded

Target Countries

No target country recorded

Sectors Targeted

No targeted sector recorded

Details

Origin 🇮🇹 IT
Last Updated 26 Mar 2025

MITRE ATT&CK 33

T027 - Obfuscated Files or Information T027.001 - Obfuscated Files or Information Binary Padding T036 - Masquerading T1021.001 - Remote Services Remote Desktop Protocol T1041 - Exfiltration Over C Channel T1059.001 - Command and Scripting Interpreter PowerShell T1059.003 - Command and Scripting Interpreter Windows Command Shell T1082 - System Information Discovery T1083 - File and Directory Discovery T1090.002 - Web Service T1098 - Account Manipulation T1124 - System Time Discovery T1190 - Exploit Public Facing Application T1485 - Data Destruction T1486 - Data Encrypted for Impact T1497.001 - Virtualization Sandbox Evasion System Checks T1498 - Network Denial of Service T1539 - Steal Web Session Cookie T1547.001 - Boot or Logon Autostart Execution Registry Run Keys Startup Folder T1548.002 - Abuse Elevation Control Mechanism Bypass UAC T1562.001 - Impair Defenses Disable or Modify Tools T1589 - Gather Victim Identity Information T1591 - Gather Victim Org Information T1592 - Gather Victim Host Information T1594 - Search Victim Owned Websites T1595.002 - Active Scanning Vulnerability Scanning T1595.003 - Active Scanning Wordlist Scanning T1596 - Search Open Technical Databases T1598.002 - Phishing for Information Spearphishing Attachment T1614 - System Location Discovery T1622 - Deobfuscate Decode Files or Information T1657 - Financial Theft T1659 - Content Injection

Related Zero-Days

No zero-day CVE linked to this actor