Alternative names (2)
TTPsInclude • usedTTPsRandom triples
| Subject | Object |
|---|---|
| gptkb:Conti_ransomware_campaigns | use of Tor for communication |
| gptkb:APT12 | watering hole attacks |
| gptkb:APT41 | data exfiltration |
| gptkb:Conti_ransomware_campaigns | use of custom ransomware builder |
| gptkb:Winnti | credential theft |
| gptkb:APT41 | web server exploitation |
| gptkb:APT54 | custom backdoors |
| gptkb:Zebrocy | multi-stage infection chains |
| gptkb:Conti_ransomware_campaigns | gptkb:Cobalt_Strike |
| gptkb:APT41 | custom malware development |
| gptkb:APT20 | lateral movement |
| gptkb:Conti_ransomware_campaigns | use of stolen credentials |
| gptkb:Conti_ransomware_campaigns | gptkb:Windows_Defender_exclusion_abuse |
| gptkb:MuddyWater_group | data exfiltration |
| gptkb:APT54 | use of web shells |
| gptkb:APT41 | supply chain compromise |
| gptkb:Conti_ransomware_campaigns | use of affiliate model |
| gptkb:Conti_ransomware_campaigns | shadow copy deletion |
| gptkb:APT41 | use of open-source tools |
| gptkb:Conti_ransomware_campaigns | RDP brute force |