Alternative names (2)
TTPsInclude • usedTTPsRandom triples
| Subject | Object |
|---|---|
| gptkb:APT12 | spear phishing |
| gptkb:MuddyWater_group | data exfiltration |
| gptkb:Gamaredon | rapid deployment of new malware variants |
| gptkb:APT41 | web server exploitation |
| gptkb:APT20 | data exfiltration |
| gptkb:APT41 | data exfiltration |
| gptkb:Zebrocy | data exfiltration |
| gptkb:MuddyWater_group | use of open-source tools |
| gptkb:APT41 | SQL injection |
| gptkb:Zebrocy | multi-stage infection chains |
| gptkb:Turla_Group | use of custom backdoors |
| gptkb:MuddyWater_group | credential harvesting |
| gptkb:Conti_ransomware_campaigns | threatening data leaks |
| gptkb:APT60 | custom malware |
| gptkb:APT20 | use of stolen credentials |
| gptkb:Gamaredon | use of legitimate cloud services for C2 |
| gptkb:Conti_ransomware_campaigns | public shaming of victims |
| gptkb:Turla_Group | living off the land techniques |
| gptkb:Winnti | lateral movement |
| gptkb:Conti_ransomware_campaigns | shadow copy deletion |