🇰🇵

WageMole

APT Group ETDA ✓

Also Known As 7 names

Famous Chollima Nickel Tapestry PurpleBravo Storm-1877 UNC5267 Void Dokkaebi WaterPlum

Target Countries 2

Countries highlighted in red

United Kingdom United States

Details

Origin 🇰🇵 KP
Last Updated 02 Jan 2026

Malware Families 4

js.jadesnow
forest_tiger
js.ottercandy
rekoobew

MITRE ATT&CK 153

T1003 - OS Credential Dumping T1005 - Data from Local System T1008 - Fallback Channels T1012 - Query Registry T1016 - System Network Configuration Discovery T1020 - Automated Exfiltration T1021 - Remote Services T1027 - Obfuscated Files or Information T1027.002 - Software Packing T1027.003 - Steganography T1027.010 T1027.013 T1033 - System Owner/User Discovery T1036 - Masquerading T1036.004 - Masquerade Task or Service T1036.005 - Match Legitimate Name or Location T1040 - Network Sniffing T1041 - Exfiltration Over C2 Channel T1048 T1048.003 T1053 - Scheduled Task/Job T1053.005 - Scheduled Task T1055 - Process Injection T1056 - Input Capture T1056.001 - Keylogging T1056.004 - Credential API Hooking T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 - Windows Command Shell T1059.004 - Unix Shell T1059.005 - Visual Basic T1059.006 - Python T1059.007 - JavaScript T1070 - Indicator Removal on Host T1070.003 - Clear Command History T1070.004 T1070.006 - Timestomp T1071 - Application Layer Protocol T1071.001 - Web Protocols T1071.003 T1071.004 - DNS T1072 - Software Deployment Tools T1074 - Data Staged T1074.001 - Local Data Staging T1078 - Valid Accounts T1078.001 - Default Accounts T1082 - System Information Discovery T1083 - File and Directory Discovery T1087 - Account Discovery T1090 - Proxy T1095 - Non-Application Layer Protocol T1098 - Account Manipulation T1102 - Web Service T1102.001 - Dead Drop Resolver T1102.002 - Bidirectional Communication T1104 - Multi-Stage Channels T1105 - Ingress Tool Transfer T1106 - Native API T1113 - Screen Capture T1114 - Email Collection T1115 - Clipboard Data T1119 - Automated Collection T1123 - Audio Capture T1132 - Data Encoding T1133 - External Remote Services T1134 - Access Token Manipulation T1140 - Deobfuscate/Decode Files or Information T1187 - Forced Authentication T1190 - Exploit Public-Facing Application T1193 - Spearphishing Attachment T1194 - Spearphishing via Service T1195 - Supply Chain Compromise T1195.001 - Compromise Software Dependencies and Development Tools T1195.002 - Compromise Software Supply Chain T1199 - Trusted Relationship T1202 - Indirect Command Execution T1204 - User Execution T1204.001 - Malicious Link T1204.002 - Malicious File T1204.004 T1204.005 T1217 - Browser Bookmark Discovery T1219 - Remote Access Software T1219.002 T1480 T1496 - Resource Hijacking T1497 - Virtualization/Sandbox Evasion T1497.001 - System Checks T1518 - Software Discovery T1528 - Steal Application Access Token T1530 - Data from Cloud Storage Object T1531 - Account Access Removal T1543 T1543.001 T1546 T1546.001 - Change Default File Association T1546.004 T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1547.009 - Shortcut Modification T1547.013 T1548 - Abuse Elevation Control Mechanism T1550 - Use Alternate Authentication Material T1552 - Unsecured Credentials T1552.001 - Credentials In Files T1553 - Subvert Trust Controls T1553.002 - Code Signing T1555 - Credentials from Password Stores T1555.001 T1555.003 - Credentials from Web Browsers T1557 - Man-in-the-Middle T1560 - Archive Collected Data T1562 - Impair Defenses T1562.001 T1566 - Phishing T1566.001 - Spearphishing Attachment T1566.002 - Spearphishing Link T1566.003 - Spearphishing via Service T1567 - Exfiltration Over Web Service T1567.002 - Exfiltration to Cloud Storage T1571 - Non-Standard Port T1573 - Encrypted Channel T1573.001 - Symmetric Cryptography T1573.002 - Asymmetric Cryptography T1574 - Hijack Execution Flow T1574.001 - DLL Search Order Hijacking T1574.002 - DLL Side-Loading T1583 - Acquire Infrastructure T1583.001 T1583.003 T1583.006 T1584 - Compromise Infrastructure T1585 - Establish Accounts T1585.001 - Social Media Accounts T1585.002 T1586 - Compromise Accounts T1587 - Develop Capabilities T1587.001 T1588 - Obtain Capabilities T1588.002 - Tool T1588.007 T1589 - Gather Victim Identity Information T1590 - Gather Victim Network Information T1591 - Gather Victim Org Information T1593 T1593.001 T1593.003 T1608 - Stage Capabilities T1608.001 T1656 T1657 T1681

Related Zero-Days

No zero-day CVE linked to this actor