🇷🇺
XDSpy
APT Group
Information theft and espionage
ETDA ✓
Also Known As
No alias recordedTarget Countries 5
Countries highlighted in red
Belgium
Belarus
Republic of Moldova
Serbia
Ukraine
Sectors Targeted
Details
Origin
🇷🇺 RU
Last Updated
01 Jun 2022
MITRE ATT&CK 37
T1005 - Data from Local System
T1020 - Automated Exfiltration
T1025 - Data from Removable Media
T1027 - Obfuscated Files or Information
T1033 - System Owner/User Discovery
T1036.004 - Masquerade Task or Service
T1041 - Exfiltration Over C2 Channel
T1047 - Windows Management Instrumentation
T1059 - Command and Scripting Interpreter
T1059.003 - Windows Command Shell
T1070 - Indicator Removal on Host
T1070.004 - File Deletion
T1071 - Application Layer Protocol
T1071.001 - Web Protocols
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1102 - Web Service
T1105 - Ingress Tool Transfer
T1113 - Screen Capture
T1115 - Clipboard Data
T1119 - Automated Collection
T1124 - System Time Discovery
T1127 - Trusted Developer Utilities Proxy Execution
T1132.001 - Standard Encoding
T1140 - Deobfuscate/Decode Files or Information
T1203 - Exploitation for Client Execution
T1204 - User Execution
T1218.011 - Rundll32
T1547 - Boot or Logon Autostart Execution
T1547.001 - Registry Run Keys / Startup Folder
T1552 - Unsecured Credentials
T1553.002 - Code Signing
T1560 - Archive Collected Data
T1566 - Phishing
T1569 - System Services
T1573 - Encrypted Channel
T1574 - Hijack Execution Flow