Moses Staff
Associated Group Descriptions |
|
Name | Description |
---|---|
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .001 | Account Discovery: Local Account |
Moses Staff has collected the administrator username from a compromised host.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1587 | .001 | Develop Capabilities: Malware |
Moses Staff has built malware, such as DCSrv and PyDCrypt, for targeting victims' machines.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
Moses Staff has used batch scripts that can disable the Windows firewall on specific remote machines.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Moses Staff has used the commercial tool DiskCryptor.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
Moses Staff has used batch scripts that can enable SMB on a compromised host.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1505 | .003 | Server Software Component: Web Shell |
Moses Staff has dropped a web shell onto a compromised system.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
Moses Staff has used signed drivers from an open source tool called DiskCryptor to evade detection.(Citation: Checkpoint MosesStaff Nov 2021) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.