PROMETHIUM
Associated Group Descriptions |
|
Name | Description |
---|---|
StrongPity | The name StrongPity has also been used to describe the group and the malware used by the group.(Citation: Bitdefender StrongPity June 2020)(Citation: Talos Promethium June 2020) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
PROMETHIUM has used Registry run keys to establish persistence.(Citation: Talos Promethium June 2020) |
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
PROMETHIUM has created new services and modified existing services for persistence.(Citation: Bitdefender StrongPity June 2020) |
Enterprise | T1587 | .002 | Develop Capabilities: Code Signing Certificates |
PROMETHIUM has created self-signed certificates to sign malicious installers.(Citation: Bitdefender StrongPity June 2020) |
.003 | Develop Capabilities: Digital Certificates |
PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.(Citation: Talos Promethium June 2020) |
||
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
PROMETHIUM has named services to appear legitimate.(Citation: Talos Promethium June 2020)(Citation: Bitdefender StrongPity June 2020) |
.005 | Masquerading: Match Legitimate Name or Location |
PROMETHIUM has disguised malicious installer files by bundling them with legitimate software installers.(Citation: Talos Promethium June 2020)(Citation: Bitdefender StrongPity June 2020) |
||
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
PROMETHIUM has signed code with self-signed certificates.(Citation: Bitdefender StrongPity June 2020) |
Enterprise | T1205 | .001 | Traffic Signaling: Port Knocking |
PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.(Citation: Bitdefender StrongPity June 2020) |
Enterprise | T1204 | .002 | User Execution: Malicious File |
PROMETHIUM has attempted to get users to execute compromised installation files for legitimate software including compression applications, security software, browsers, file recovery applications, and other tools and utilities.(Citation: Talos Promethium June 2020)(Citation: Bitdefender StrongPity June 2020) |
Enterprise | T1078 | .003 | Valid Accounts: Local Accounts |
PROMETHIUM has created admin accounts on a compromised host.(Citation: Bitdefender StrongPity June 2020) |
Software |
|||
ID | Name | References | Techniques |
---|---|---|---|
S0491 | StrongPity | (Citation: Bitdefender StrongPity June 2020) (Citation: Talos Promethium June 2020) | Automated Exfiltration, Hidden Window, Non-Standard Port, System Network Configuration Discovery, Exfiltration Over C2 Channel, Archive via Custom Method, Masquerade Task or Service, Encrypted/Encoded File, Disable or Modify Tools, Malicious File, Web Protocols, File Deletion, Security Software Discovery, File and Directory Discovery, Automated Collection, PowerShell, Windows Service, Asymmetric Cryptography, System Information Discovery, Multi-hop Proxy, Ingress Tool Transfer, Registry Run Keys / Startup Folder, Process Discovery, Service Execution, Code Signing, Match Legitimate Name or Location |
S0178 | Truvasys | (Citation: Microsoft NEODYMIUM Dec 2016) (Citation: Microsoft SIR Vol 21) (Citation: Microsoft Win Defender Truvasys Sep 2017) | Registry Run Keys / Startup Folder, Masquerade Task or Service |
References
- Microsoft. (2016, December 14). Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe. Retrieved November 27, 2017.
- Anthe, C. et al. (2016, December 14). Microsoft Security Intelligence Report Volume 21. Retrieved November 27, 2017.
- Mercer, W. et al. (2020, June 29). PROMETHIUM extends global reach with StrongPity3 APT. Retrieved July 20, 2020.
- Tudorica, R. et al. (2020, June 30). StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure. Retrieved July 20, 2020.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.