🇷🇺

XDSpy

APT Group Information theft and espionage ETDA ✓

Also Known As

No alias recorded

Target Countries 5

Countries highlighted in red

Belgium Belarus Republic of Moldova Serbia Ukraine

Details

Origin 🇷🇺 RU
Last Updated 01 Jun 2022

MITRE ATT&CK 37

T1005 - Data from Local System T1020 - Automated Exfiltration T1025 - Data from Removable Media T1027 - Obfuscated Files or Information T1033 - System Owner/User Discovery T1036.004 - Masquerade Task or Service T1041 - Exfiltration Over C2 Channel T1047 - Windows Management Instrumentation T1059 - Command and Scripting Interpreter T1059.003 - Windows Command Shell T1070 - Indicator Removal on Host T1070.004 - File Deletion T1071 - Application Layer Protocol T1071.001 - Web Protocols T1082 - System Information Discovery T1083 - File and Directory Discovery T1102 - Web Service T1105 - Ingress Tool Transfer T1113 - Screen Capture T1115 - Clipboard Data T1119 - Automated Collection T1124 - System Time Discovery T1127 - Trusted Developer Utilities Proxy Execution T1132.001 - Standard Encoding T1140 - Deobfuscate/Decode Files or Information T1203 - Exploitation for Client Execution T1204 - User Execution T1218.011 - Rundll32 T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1552 - Unsecured Credentials T1553.002 - Code Signing T1560 - Archive Collected Data T1566 - Phishing T1569 - System Services T1573 - Encrypted Channel T1574 - Hijack Execution Flow

Related Zero-Days

No zero-day CVE linked to this actor