Alternative names (2)
TTPsInclude • usedTTPsRandom triples
Subject | Object |
---|---|
gptkb:MuddyWater_group | multi-stage attacks |
gptkb:Turla_Group | use of legitimate software for persistence |
gptkb:APT60 | watering hole attacks |
gptkb:APT41 | use of Cobalt Strike beacons |
gptkb:Winnti | supply chain attacks |
gptkb:Zebrocy | custom malware development |
gptkb:Gamaredon | frequent infrastructure changes |
gptkb:APT54 | living off the land |
gptkb:Conti_ransomware_campaigns | use of Tor for communication |
gptkb:Turla_Group | living off the land techniques |
gptkb:APT60 | spear phishing |
gptkb:APT54 | use of legitimate credentials |
gptkb:APT41 | privilege escalation |
gptkb:Conti_ransomware_campaigns | PowerShell scripts |
gptkb:Conti_ransomware_campaigns | use of stolen credentials |
gptkb:APT41 | spear phishing |
gptkb:APT12 | watering hole attacks |
gptkb:Turla_Group | use of custom backdoors |
gptkb:Conti_ransomware_campaigns | use of cryptocurrency wallets |
gptkb:APT20 | use of stolen credentials |