Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

Dust Storm

Dust Storm is a threat group that has targeted multiple industries in Japan, South Korea, the United States, Europe, and several Southeast Asian countries. (Citation: Cylance Dust Storm)
ID: G0031
Associated Groups: 
Version: 1.0
Created: 31 May 2017
Last Modified: 29 Sep 2022

Associated Group Descriptions

Name Description

Software

ID Name References Techniques
S0083 Misdat (Citation: Cylance Dust Storm) Match Legitimate Name or Location, File and Directory Discovery, Custom Command and Control Protocol, Exfiltration Over C2 Channel, Non-Application Layer Protocol, Data from Local System, File Deletion, Commonly Used Port, Clear Persistence, System Information Discovery, Boot or Logon Autostart Execution, Standard Encoding, Ingress Tool Transfer, Windows Command Shell, System Language Discovery, Indicator Removal, Software Packing, Timestomp, Native API
S0086 ZLib (Citation: Cylance Dust Storm) Ingress Tool Transfer, System Information Discovery, Archive via Library, Windows Service, File and Directory Discovery, Screen Capture, Windows Command Shell, System Service Discovery, Exfiltration Over C2 Channel, Web Protocols, Match Legitimate Name or Location
S0085 S-Type (Citation: Cylance Dust Storm) Commonly Used Port, Match Legitimate Name or Location, System Owner/User Discovery, Indicator Removal, Exfiltration Over C2 Channel, Ingress Tool Transfer, Fallback Channels, Web Protocols, Windows Command Shell, System Language Discovery, Local Account, File Deletion, System Information Discovery, Standard Encoding, Shortcut Modification, Software Packing, Clear Persistence, System Network Configuration Discovery, System Service Discovery, Native API, Registry Run Keys / Startup Folder, Local Account
S0084 Mis-Type (Citation: Cylance Dust Storm) Custom Command and Control Protocol, Native API, Boot or Logon Autostart Execution, System Network Configuration Discovery, Windows Command Shell, Ingress Tool Transfer, Match Legitimate Name or Location, Local Account, Standard Encoding, Web Protocols, System Owner/User Discovery, Commonly Used Port, Local Account, Fallback Channels, Data from Local System, System Information Discovery, Exfiltration Over C2 Channel, Non-Application Layer Protocol, Process Injection, Local Data Staging

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.