Elderwood
Associated Group Descriptions |
|
Name | Description |
---|---|
Elderwood Gang | (Citation: Symantec Elderwood Sept 2012) (Citation: CSM Elderwood Sept 2012) |
Beijing Group | (Citation: CSM Elderwood Sept 2012) |
Sneaky Panda | (Citation: CSM Elderwood Sept 2012) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1027 | .002 | Obfuscated Files or Information: Software Packing |
Elderwood has packed malware payloads before delivery to victims.(Citation: Symantec Elderwood Sept 2012) |
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012) |
.002 | Phishing: Spearphishing Link |
Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012) |
||
Enterprise | T1204 | .001 | User Execution: Malicious Link |
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012) |
.002 | User Execution: Malicious File |
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012) |
References
- O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.
- O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.
- Clayton, M.. (2012, September 14). Stealing US business secrets: Experts ID two huge cyber 'gangs' in China. Retrieved February 15, 2018.
- Paganini, P. (2012, September 9). Elderwood project, who is behind Op. Aurora and ongoing attacks?. Retrieved February 13, 2018.
- Ladley, F. (2012, May 15). Backdoor.Ritsol. Retrieved February 23, 2018.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.