Skip to content

Latest commit

 

History

History
33 lines (29 loc) · 9.34 KB

G0016.md

File metadata and controls

33 lines (29 loc) · 9.34 KB

G0016:APT29

Description

APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008. (Citation: F-Secure The Dukes) (Citation: GRIZZLY STEPPE JAR) This group reportedly compromised the Democratic National Committee starting in the summer of 2015. (Citation: Crowdstrike DNC June 2016)

TTPs

Platform Tactic Technique Description Data Sources
Linux, macOS, Windows defense-evasion Indicator Removal on Host APT29 used SDelete to remove artifacts from victims. File monitoring, Process monitoring, Process command-line parameters, API monitoring, Windows event logs
Windows persistence Shortcut Modification APT29 drops a Windows shortcut file for execution. File monitoring, Process monitoring, Process command-line parameters
Linux, macOS, Windows defense-evasion Obfuscated Files or Information APT29 uses PowerShell to use Base64 for obfuscation. Network protocol analysis, Process use of network, File monitoring, Malware reverse engineering, Binary file metadata, Process command-line parameters, Environment variable, Process monitoring, Windows event logs, Network intrusion detection system, Email gateway, SSL/TLS inspection
Windows defense-evasion, execution Rundll32 APT29 has used rundll32.exe for execution. File monitoring, Process monitoring, Process command-line parameters, Binary file metadata
Linux, macOS, Windows command-and-control Commonly Used Port APT29 has used Port Number 443 for C2. Packet capture, Netflow/Enclave netflow, Process use of network, Process monitoring
Windows, Linux, macOS command-and-control Standard Non-Application Layer Protocol APT29 uses TCP for C2 communications. Host network interface, Netflow/Enclave netflow, Network intrusion detection system, Network protocol analysis, Packet capture, Process use of network
Linux, Windows, macOS execution User Execution APT29 has used various forms of spearphishing attempting to get a user to open links or attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files. Anti-virus, Process command-line parameters, Process monitoring
Linux, Windows, macOS execution Exploitation for Client Execution APT29 has used multiple software exploits for common client software, like Microsoft Word and Adobe Reader, to gain code execution as part of. Anti-virus, System calls, Process monitoring
Windows, macOS, Linux initial-access Spearphishing Attachment APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims. File monitoring, Packet capture, Network intrusion detection system, Detonation chamber, Email gateway, Mail server
Windows, macOS, Linux, Office 365, SaaS initial-access Spearphishing Link APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files. Packet capture, Web proxy, Email gateway, Detonation chamber, SSL/TLS inspection, DNS records, Mail server
Linux, macOS, Windows command-and-control Domain Fronting APT29 has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic. SSL/TLS inspection, Packet capture
Linux, macOS, Windows command-and-control Multi-hop Proxy A backdoor used by APT29 created a Tor hidden service to forward traffic from the Tor client to local ports 3389 (RDP), 139 (Netbios), and 445 (SMB) enabling full remote access from outside the network. Network protocol analysis, Netflow/Enclave netflow
Windows defense-evasion, privilege-escalation Bypass User Account Control APT29 has bypassed UAC. System calls, Process monitoring, Authentication logs, Process command-line parameters
Windows persistence, privilege-escalation Accessibility Features APT29 used sticky-keys to obtain unauthenticated, privileged console access. Windows Registry, File monitoring, Process monitoring
Windows persistence Registry Run Keys / Startup Folder APT29 added Registry Run keys to establish persistence. Windows Registry, File monitoring
Windows lateral-movement Pass the Ticket APT29 used Kerberos ticket attacks for lateral movement. Authentication logs
Windows, macOS defense-evasion Software Packing APT29 used UPX to pack files. Binary file metadata
Windows persistence Windows Management Instrumentation Event Subscription APT29 has used WMI event filters to establish persistence. WMI Objects
Windows execution Windows Management Instrumentation APT29 used WMI to steal credentials and execute backdoors at a future time. Authentication logs, Netflow/Enclave netflow, Process monitoring, Process command-line parameters
Windows execution, persistence, privilege-escalation Scheduled Task APT29 used named and hijacked scheduled tasks to establish persistence. File monitoring, Process monitoring, Process command-line parameters, Windows event logs
Linux, macOS, Windows defense-evasion, execution Scripting APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke, as well as to evade defenses. Process monitoring, File monitoring, Process command-line parameters
Windows execution PowerShell APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke. APT29 also used PowerShell scripts to evade defenses. PowerShell logs, Loaded DLLs, DLL monitoring, Windows Registry, File monitoring, Process monitoring, Process command-line parameters
Linux, macOS, Windows defense-evasion File Deletion APT29 used SDelete to remove artifacts from victims. File monitoring, Process command-line parameters, Binary file metadata