🇷🇺

WIZARD SPIDER

APT Group Financial gain Financial crime 8 zero-day CVEs ETDA ✓

Also Known As 11 names

DEV-0193 DEV-0237 FIN12 GOLD BLACKBURN Periwinkle Tempest Pistachio Tempest Storm-0193 Storm-0230 TEMP.MixMaster Trickbot LLC UNC2053

Target Countries 7

Countries highlighted in red

Canada Germany United Kingdom India Mexico Ukraine United States

Details

Origin 🇷🇺 RU
Last Updated 02 Apr 2025

Malware Families 7

anchor_dns
feodo
EMOTET
zhmimikatz
bazarnimrod
TRICKBOT
anchormail

MITRE ATT&CK 127

T1001 - Data Obfuscation T1003 - OS Credential Dumping T1003.001 T1003.002 T1003.003 T1005 - Data from Local System T1011 T1016 T1018 - Remote System Discovery T1021 - Remote Services T1021.001 - Remote Desktop Protocol T1021.002 T1021.006 T1027 - Obfuscated Files or Information T1027.010 T1033 - System Owner/User Discovery T1036 - Masquerading T1036.004 T1041 - Exfiltration Over C2 Channel T1046 - Network Service Scanning T1047 - Windows Management Instrumentation T1048 - Exfiltration Over Alternative Protocol T1048.003 T1049 - System Network Connections Discovery T1053 T1053.005 T1055 - Process Injection T1055.001 T1056 - Input Capture T1059 - Command and Scripting Interpreter T1059.001 T1059.003 T1068 - Exploitation for Privilege Escalation T1070 T1070.004 T1071 - Application Layer Protocol T1071.001 T1071.003 T1074 T1074.001 T1078 - Valid Accounts T1078.001 T1078.002 T1082 - System Information Discovery T1083 - File and Directory Discovery T1087 T1087.002 T1090 - Proxy T1095 - Non-Application Layer Protocol T1102 - Web Service T1105 - Ingress Tool Transfer T1110 - Brute Force T1112 - Modify Registry T1113 - Screen Capture T1127 T1132 T1133 - External Remote Services T1135 T1136 T1136.001 T1136.002 T1140 - Deobfuscate/Decode Files or Information T1176 - Browser Extensions T1185 - Man in the Browser T1187 - Forced Authentication T1190 - Exploit Public-Facing Application T1195 - Supply Chain Compromise T1197 T1204 - User Execution T1204.001 T1204.002 T1210 T1218 - Signed Binary Proxy Execution T1218.011 T1222 - File and Directory Permissions Modification T1222.001 T1486 - Data Encrypted for Impact T1489 T1490 - Inhibit System Recovery T1497 - Virtualization/Sandbox Evasion T1498 - Network Denial of Service T1505.003 - Web Shell T1518 T1518.001 T1518.002 T1531 - Account Access Removal T1543 - Create or Modify System Process T1543.003 T1547 - Boot or Logon Autostart Execution T1547.001 T1547.004 T1550 - Use Alternate Authentication Material T1550.002 T1552 T1552.006 T1553 T1553.002 T1555 T1555.004 T1557 T1557.001 T1558 - Steal or Forge Kerberos Tickets T1558.003 T1560 - Archive Collected Data T1560.001 T1562 - Impair Defenses T1562.001 T1566 - Phishing T1566.001 T1566.002 T1567 - Exfiltration Over Web Service T1567.002 T1568 - Dynamic Resolution T1569 - System Services T1569.002 T1570 - Lateral Tool Transfer T1571 - Non-Standard Port T1572 - Protocol Tunneling T1573 - Encrypted Channel T1583 - Acquire Infrastructure T1585 T1585.002 T1587 - Develop Capabilities T1588 T1588.002 T1588.003 T1685