Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

Winter Vivern

Winter Vivern is a group linked to Russian and Belorussian interests active since at least 2020 targeting various European government and NGO entities, along with sporadic targeting of Indian and US victims. The group leverages a combination of document-based phishing activity and server-side exploitation for initial access, leveraging adversary-controlled and -created infrastructure for follow-on command and control.(Citation: DomainTools WinterVivern 2021)(Citation: SentinelOne WinterVivern 2023)(Citation: CERT-UA WinterVivern 2023)(Citation: ESET WinterVivern 2023)(Citation: Proofpoint WinterVivern 2023)
ID: G1035
Associated Groups: UAC-0114, TA473
Created: 29 Jul 2024
Last Modified: 10 Oct 2024

Associated Group Descriptions

Name Description
UAC-0114 (Citation: CERT-UA WinterVivern 2023)
TA473 (Citation: Proofpoint WinterVivern 2023)

Techniques Used

Domain ID Name Use
Enterprise T1583 .001 Acquire Infrastructure: Domains

Winter Vivern registered domains mimicking other entities throughout various campaigns.(Citation: DomainTools WinterVivern 2021)

.003 Acquire Infrastructure: Virtual Private Server

Winter Vivern used adversary-owned and -controlled servers to host web vulnerability scanning applications.(Citation: SentinelOne WinterVivern 2023)

Enterprise T1595 .002 Active Scanning: Vulnerability Scanning

Winter Vivern has used remotely-hosted instances of the Acunetix vulnerability scanner.(Citation: SentinelOne WinterVivern 2023)

Enterprise T1071 .001 Application Layer Protocol: Web Protocols

Winter Vivern uses HTTP and HTTPS protocols for exfiltration and command and control activity.(Citation: SentinelOne WinterVivern 2023)(Citation: CERT-UA WinterVivern 2023)

Enterprise T1059 .001 Command and Scripting Interpreter: PowerShell

Winter Vivern passed execution from document macros to PowerShell scripts during initial access operations.(Citation: DomainTools WinterVivern 2021) Winter Vivern used batch scripts that called PowerShell commands as part of initial access and installation operations.(Citation: CERT-UA WinterVivern 2023)

.003 Command and Scripting Interpreter: Windows Command Shell

Winter Vivern distributed Windows batch scripts disguised as virus scanners to prompt download of malicious payloads using built-in system tools.(Citation: SentinelOne WinterVivern 2023)(Citation: CERT-UA WinterVivern 2023)

.007 Command and Scripting Interpreter: JavaScript

Winter Vivern delivered malicious JavaScript to exploit targets when exploiting Roundcube Webmail servers.(Citation: ESET WinterVivern 2023)

Enterprise T1584 .006 Compromise Infrastructure: Web Services

Winter Vivern has used compromised WordPress sites to host malicious payloads for download.(Citation: SentinelOne WinterVivern 2023)

Enterprise T1114 .001 Email Collection: Local Email Collection

Winter Vivern delivered malicious JavaScript payloads capable of exfiltrating email messages from exploited email servers.(Citation: ESET WinterVivern 2023)

Enterprise T1056 .003 Input Capture: Web Portal Capture

Winter Vivern registered and hosted domains to allow for creation of web pages mimicking legitimate government email logon sites to collect logon information.(Citation: SentinelOne WinterVivern 2023)

Enterprise T1036 .004 Masquerading: Masquerade Task or Service

Winter Vivern has distributed malicious scripts and executables mimicking virus scanners.(Citation: SentinelOne WinterVivern 2023)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

Winter Vivern leverages malicious attachments delivered via email for initial access activity.(Citation: DomainTools WinterVivern 2021)(Citation: SentinelOne WinterVivern 2023)(Citation: CERT-UA WinterVivern 2023)

Enterprise T1053 .005 Scheduled Task/Job: Scheduled Task

Winter Vivern executed PowerShell scripts that would subsequently attempt to establish persistence by creating scheduled tasks objects to periodically retrieve and execute remotely-hosted payloads.(Citation: DomainTools WinterVivern 2021)

Enterprise T1204 .001 User Execution: Malicious Link

Winter Vivern has mimicked legitimate government-related domains to deliver malicious webpages containing links to documents or other content for user execution.(Citation: SentinelOne WinterVivern 2023)(Citation: CERT-UA WinterVivern 2023)

Software

ID Name References Techniques

References

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.