Trusted Design

Detections for the Axios supply chain compromise

概要

A supply chain attack targeting Axios npm package versions 1.14.1 and 0.30.4 introduced a malicious transitive dependency (plain-crypto-js@4.2.1) that executed during installation. The attack deploys cross-platform payloads across Linux, Windows, and macOS through a consistent pattern: Node.js spawns OS-native shells to retrieve and execute remote payloads in detached or hidden contexts. Linux victims receive a Python-based RAT, Windows systems get a PowerShell backdoor with registry persistence, and macOS hosts are compromised with a Mach-O binary backdoor. All variants beacon to the same C2 infrastructure, performing host fingerprinting, process enumeration, filesystem reconnaissance, and arbitrary code execution. The malicious activity is reliably detected through behavioral signatures focusing on unusual Node.js process ancestry and remote payload retrieval rather than static indicators.

Created: 2026-04-07

Indicators

類似Pulses

類似するPulseは見つかりませんでした。

このPulseに関連する脅威アクター (事実ベース)

HAFNIUM

Score: 14.74
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1583.005 - Botnet
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1068 - Exploitation for Privilege Escalation
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

menuPass

Score: 20.29
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1106 - Native API
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1078 - Valid Accounts
  • T1036.003 - Rename Legitimate Utilities
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

Wizard Spider

Score: 22.92
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1003.002 - Security Account Manager
  • T1518.002 - Backup Software Discovery
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1041 - Exfiltration Over C2 Channel
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
  • T1550.002 - Pass the Hash
MITREへのリンク →

APT33

Score: 7.64
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1552.001 - Credentials In Files
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
MITREへのリンク →

Fox Kitten

Score: 14.56
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1546.008 - Accessibility Features
  • T1552.001 - Credentials In Files
  • T1078 - Valid Accounts
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

Volt Typhoon

Score: 46.26
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1007 - System Service Discovery
  • T1584.003 - Virtual Private Server
  • T1190 - Exploit Public-Facing Application
  • T1010 - Application Window Discovery
  • T1589 - Gather Victim Identity Information
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1591 - Gather Victim Org Information
  • T1059.004 - Unix Shell
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1587.004 - Exploits
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
  • T1518 - Software Discovery
  • T1596.005 - Scan Databases
MITREへのリンク →

APT1

Score: 13.31
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1007 - System Service Discovery
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1059.003 - Windows Command Shell
  • T1550.002 - Pass the Hash
MITREへのリンク →

Mustang Panda

Score: 38.23
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1557 - Adversary-in-the-Middle
  • T1587.001 - Malware
  • T1598.003 - Spearphishing Link
  • T1106 - Native API
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1505.003 - Web Shell
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1218.005 - Mshta
  • T1041 - Exfiltration Over C2 Channel
  • T1052.001 - Exfiltration over USB
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
  • T1518 - Software Discovery
MITREへのリンク →

Play

Score: 12.35
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

Chimera

Score: 20.99
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1071.004 - DNS
  • T1007 - System Service Discovery
  • T1106 - Native API
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1041 - Exfiltration Over C2 Channel
  • T1078 - Valid Accounts
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
  • T1550.002 - Pass the Hash
MITREへのリンク →

Sea Turtle

Score: 28.56
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1557 - Adversary-in-the-Middle
  • T1583.002 - DNS Server
  • T1213.006 - Databases
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1059.004 - Unix Shell
  • T1078 - Valid Accounts
  • T1608.003 - Install Digital Certificate
  • T1027.004 - Compile After Delivery
MITREへのリンク →

APT39

Score: 14.45
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1071.004 - DNS
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1041 - Exfiltration Over C2 Channel
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
MITREへのリンク →

RedCurl

Score: 7.17
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1587.001 - Malware
  • T1552.001 - Credentials In Files
  • T1059.003 - Windows Command Shell
MITREへのリンク →

APT5

Score: 15.89
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1583.005 - Botnet
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1049 - System Network Connections Discovery
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Agrius

Score: 13.69
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1041 - Exfiltration Over C2 Channel
  • T1562.001 - Disable or Modify Tools
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

GALLIUM

Score: 22.55
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1041 - Exfiltration Over C2 Channel
  • T1078 - Valid Accounts
  • T1036.003 - Rename Legitimate Utilities
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
  • T1550.002 - Pass the Hash
MITREへのリンク →

APT41

Score: 40.78
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1071.004 - DNS
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1546.008 - Accessibility Features
  • T1049 - System Network Connections Discovery
  • T1059.004 - Unix Shell
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1595.003 - Wordlist Scanning
  • T1213.003 - Code Repositories
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
  • T1550.002 - Pass the Hash
  • T1596.005 - Scan Databases
MITREへのリンク →

MuddyWater

Score: 26.36
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1190 - Exploit Public-Facing Application
  • T1218.003 - CMSTP
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1552.001 - Credentials In Files
  • T1218.005 - Mshta
  • T1041 - Exfiltration Over C2 Channel
  • T1562.001 - Disable or Modify Tools
  • T1027.004 - Compile After Delivery
  • T1059.003 - Windows Command Shell
  • T1518 - Software Discovery
MITREへのリンク →

APT28

Score: 37.04
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1598.003 - Spearphishing Link
  • T1091 - Replication Through Removable Media
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1591 - Gather Victim Org Information
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1598 - Phishing for Information
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1498 - Network Denial of Service
  • T1550.002 - Pass the Hash
  • T1137.002 - Office Test
MITREへのリンク →

Turla

Score: 27.61
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1587.001 - Malware
  • T1213.006 - Databases
  • T1007 - System Service Discovery
  • T1106 - Native API
  • T1584.003 - Virtual Private Server
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1562.001 - Disable or Modify Tools
  • T1068 - Exploitation for Privilege Escalation
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
MITREへのリンク →

Sowbug

Score: 4.48
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1059.003 - Windows Command Shell
MITREへのリンク →

BRONZE BUTLER

Score: 16.77
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1007 - System Service Discovery
  • T1550.003 - Pass the Ticket
  • T1562.001 - Disable or Modify Tools
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1518 - Software Discovery
MITREへのリンク →

UNC3886

Score: 22.24
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1205.001 - Port Knocking
  • T1059.004 - Unix Shell
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1587.004 - Exploits
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Kimsuky

Score: 50.45
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1557 - Adversary-in-the-Middle
  • T1056.001 - Keylogging
  • T1587.001 - Malware
  • T1598.003 - Spearphishing Link
  • T1007 - System Service Discovery
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1552.001 - Credentials In Files
  • T1218.005 - Mshta
  • T1041 - Exfiltration Over C2 Channel
  • T1591 - Gather Victim Org Information
  • T1562.001 - Disable or Modify Tools
  • T1593.001 - Social Media
  • T1598 - Phishing for Information
  • T1059.003 - Windows Command Shell
  • T1550.002 - Pass the Hash
  • T1588.005 - Exploits
MITREへのリンク →

APT3

Score: 17.01
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1016 - System Network Configuration Discovery
  • T1546.008 - Accessibility Features
  • T1049 - System Network Connections Discovery
  • T1552.001 - Credentials In Files
  • T1041 - Exfiltration Over C2 Channel
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

FIN8

Score: 9.95
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

Ke3chang

Score: 27.90
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1071.004 - DNS
  • T1587.001 - Malware
  • T1583.005 - Botnet
  • T1007 - System Service Discovery
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1041 - Exfiltration Over C2 Channel
  • T1078 - Valid Accounts
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

Lotus Blossom

Score: 10.19
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1134 - Access Token Manipulation
  • T1018 - Remote System Discovery
MITREへのリンク →

FIN13

Score: 27.94
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1589 - Gather Victim Identity Information
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1552.001 - Credentials In Files
  • T1134.003 - Make and Impersonate Token
  • T1059.003 - Windows Command Shell
  • T1550.002 - Pass the Hash
MITREへのリンク →

Earth Lusca

Score: 20.95
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1547.012 - Print Processors
  • T1007 - System Service Discovery
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1218.005 - Mshta
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
MITREへのリンク →

Magic Hound

Score: 28.57
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1589 - Gather Victim Identity Information
  • T1505.003 - Web Shell
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1562.001 - Disable or Modify Tools
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Aquatic Panda

Score: 12.45
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1007 - System Service Discovery
  • T1059.004 - Unix Shell
  • T1562.001 - Disable or Modify Tools
  • T1059.003 - Windows Command Shell
  • T1550.002 - Pass the Hash
MITREへのリンク →

INC Ransom

Score: 11.31
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1190 - Exploit Public-Facing Application
  • T1049 - System Network Connections Discovery
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Akira

Score: 13.24
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1558 - Steal or Forge Kerberos Tickets
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1018 - Remote System Discovery
MITREへのリンク →

ToddyCat

Score: 12.10
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1106 - Native API
  • T1190 - Exploit Public-Facing Application
  • T1049 - System Network Connections Discovery
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

APT38

Score: 24.74
Matched TTPs:
  • T1056.001 - Keylogging
  • T1106 - Native API
  • T1505.003 - Web Shell
  • T1049 - System Network Connections Discovery
  • T1218.005 - Mshta
  • T1562.001 - Disable or Modify Tools
  • T1486 - Data Encrypted for Impact
  • T1036.003 - Rename Legitimate Utilities
  • T1565.002 - Transmitted Data Manipulation
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
MITREへのリンク →

Ajax Security Team

Score: 4.46
Matched TTPs:
  • T1056.001 - Keylogging
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Darkhotel

Score: 9.16
Matched TTPs:
  • T1056.001 - Keylogging
  • T1091 - Replication Through Removable Media
  • T1016 - System Network Configuration Discovery
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
MITREへのリンク →

Tonto Team

Score: 5.80
Matched TTPs:
  • T1056.001 - Keylogging
  • T1505.003 - Web Shell
  • T1068 - Exploitation for Privilege Escalation
MITREへのリンク →

Threat Group-3390

Score: 20.72
Matched TTPs:
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
MITREへのリンク →

Lazarus Group

Score: 35.00
Matched TTPs:
  • T1056.001 - Keylogging
  • T1587.001 - Malware
  • T1106 - Native API
  • T1010 - Application Window Discovery
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1218.005 - Mshta
  • T1041 - Exfiltration Over C2 Channel
  • T1591 - Gather Victim Org Information
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1036.003 - Rename Legitimate Utilities
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

PLATINUM

Score: 5.80
Matched TTPs:
  • T1056.001 - Keylogging
  • T1068 - Exploitation for Privilege Escalation
  • T1189 - Drive-by Compromise
MITREへのリンク →

FIN4

Score: 3.36
Matched TTPs:
  • T1056.001 - Keylogging
  • T1078 - Valid Accounts
MITREへのリンク →

Sandworm Team

Score: 37.29
Matched TTPs:
  • T1056.001 - Keylogging
  • T1587.001 - Malware
  • T1213.006 - Databases
  • T1598.003 - Spearphishing Link
  • T1106 - Native API
  • T1608.001 - Upload Malware
  • T1195 - Supply Chain Compromise
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1585.002 - Email Accounts
  • T1049 - System Network Connections Discovery
  • T1041 - Exfiltration Over C2 Channel
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1499 - Endpoint Denial of Service
  • T1018 - Remote System Discovery
MITREへのリンク →

OilRig

Score: 38.28
Matched TTPs:
  • T1056.001 - Keylogging
  • T1071.004 - DNS
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1556.002 - Password Filter DLL
  • T1608.001 - Upload Malware
  • T1195 - Supply Chain Compromise
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1552.001 - Credentials In Files
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1137.004 - Outlook Home Page
  • T1059.003 - Windows Command Shell
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

APT42

Score: 11.80
Matched TTPs:
  • T1056.001 - Keylogging
  • T1608.001 - Upload Malware
  • T1070.008 - Clear Mailbox Data
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
MITREへのリンク →

HEXANE

Score: 24.31
Matched TTPs:
  • T1056.001 - Keylogging
  • T1583.002 - DNS Server
  • T1608.001 - Upload Malware
  • T1010 - Application Window Discovery
  • T1589 - Gather Victim Identity Information
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1018 - Remote System Discovery
  • T1518 - Software Discovery
MITREへのリンク →

APT32

Score: 34.81
Matched TTPs:
  • T1056.001 - Keylogging
  • T1598.003 - Spearphishing Link
  • T1608.001 - Upload Malware
  • T1589 - Gather Victim Identity Information
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1550.003 - Pass the Ticket
  • T1049 - System Network Connections Discovery
  • T1218.005 - Mshta
  • T1041 - Exfiltration Over C2 Channel
  • T1068 - Exploitation for Privilege Escalation
  • T1036.003 - Rename Legitimate Utilities
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1550.002 - Pass the Hash
MITREへのリンク →

Contagious Interview

Score: 27.75
Matched TTPs:
  • T1588.007 - Artificial Intelligence
  • T1587.001 - Malware
  • T1608.001 - Upload Malware
  • T1589 - Gather Victim Identity Information
  • T1585.002 - Email Accounts
  • T1041 - Exfiltration Over C2 Channel
  • T1059.004 - Unix Shell
  • T1562.001 - Disable or Modify Tools
  • T1593.001 - Social Media
  • T1059.003 - Windows Command Shell
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Mustard Tempest

Score: 8.28
Matched TTPs:
  • T1583.008 - Malvertising
  • T1608.001 - Upload Malware
  • T1189 - Drive-by Compromise
MITREへのリンク →

Daggerfly

Score: 7.64
Matched TTPs:
  • T1003.002 - Security Account Manager
  • T1036.003 - Rename Legitimate Utilities
  • T1189 - Drive-by Compromise
MITREへのリンク →

APT29

Score: 32.51
Matched TTPs:
  • T1003.002 - Security Account Manager
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1546.008 - Accessibility Features
  • T1550.003 - Pass the Ticket
  • T1218.005 - Mshta
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1027.006 - HTML Smuggling
  • T1651 - Cloud Administration Command
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Dragonfly

Score: 23.20
Matched TTPs:
  • T1003.002 - Security Account Manager
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1598.002 - Spearphishing Attachment
  • T1078 - Valid Accounts
  • T1187 - Forced Authentication
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
MITREへのリンク →

Ember Bear

Score: 29.29
Matched TTPs:
  • T1003.002 - Security Account Manager
  • T1071.004 - DNS
  • T1195 - Supply Chain Compromise
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1552.001 - Credentials In Files
  • T1562.001 - Disable or Modify Tools
  • T1595.001 - Scanning IP Blocks
  • T1018 - Remote System Discovery
  • T1550.002 - Pass the Hash
  • T1588.005 - Exploits
MITREへのリンク →

Axiom

Score: 16.33
Matched TTPs:
  • T1583.002 - DNS Server
  • T1190 - Exploit Public-Facing Application
  • T1546.008 - Accessibility Features
  • T1078 - Valid Accounts
  • T1189 - Drive-by Compromise
  • T1001.002 - Steganography
MITREへのリンク →

LazyScripter

Score: 8.01
Matched TTPs:
  • T1071.004 - DNS
  • T1608.001 - Upload Malware
  • T1218.005 - Mshta
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Cobalt Group

Score: 9.93
Matched TTPs:
  • T1071.004 - DNS
  • T1218.003 - CMSTP
  • T1068 - Exploitation for Privilege Escalation
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Tropic Trooper

Score: 20.87
Matched TTPs:
  • T1071.004 - DNS
  • T1106 - Native API
  • T1091 - Replication Through Removable Media
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1052.001 - Exfiltration over USB
  • T1059.003 - Windows Command Shell
  • T1518 - Software Discovery
MITREへのリンク →

APT18

Score: 5.13
Matched TTPs:
  • T1071.004 - DNS
  • T1078 - Valid Accounts
  • T1059.003 - Windows Command Shell
MITREへのリンク →

FIN7

Score: 25.51
Matched TTPs:
  • T1071.004 - DNS
  • T1587.001 - Malware
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1218.005 - Mshta
  • T1608.005 - Link Target
  • T1591 - Gather Victim Org Information
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Moonstone Sleet

Score: 21.87
Matched TTPs:
  • T1587.001 - Malware
  • T1598.003 - Spearphishing Link
  • T1608.001 - Upload Malware
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1591 - Gather Victim Org Information
  • T1486 - Data Encrypted for Impact
  • T1598 - Phishing for Information
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Indrik Spider

Score: 17.49
Matched TTPs:
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1585.002 - Email Accounts
  • T1552.001 - Credentials In Files
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

LuminousMoth

Score: 12.92
Matched TTPs:
  • T1587.001 - Malware
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1608.005 - Link Target
  • T1041 - Exfiltration Over C2 Channel
MITREへのリンク →

Salt Typhoon

Score: 8.10
Matched TTPs:
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1602.002 - Network Device Configuration Dump
MITREへのリンク →

Aoqin Dragon

Score: 5.13
Matched TTPs:
  • T1587.001 - Malware
  • T1091 - Replication Through Removable Media
MITREへのリンク →

Moses Staff

Score: 6.80
Matched TTPs:
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
MITREへのリンク →

TeamTNT

Score: 26.57
Matched TTPs:
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1608.001 - Upload Malware
  • T1610 - Deploy Container
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1552.001 - Credentials In Files
  • T1059.004 - Unix Shell
  • T1562.001 - Disable or Modify Tools
  • T1059.003 - Windows Command Shell
  • T1595.001 - Scanning IP Blocks
MITREへのリンク →

Scattered Spider

Score: 43.07
Matched TTPs:
  • T1484.002 - Trust Modification
  • T1598.003 - Spearphishing Link
  • T1070.008 - Clear Mailbox Data
  • T1589 - Gather Victim Identity Information
  • T1598.004 - Spearphishing Voice
  • T1016 - System Network Configuration Discovery
  • T1552.001 - Credentials In Files
  • T1041 - Exfiltration Over C2 Channel
  • T1059.004 - Unix Shell
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1486 - Data Encrypted for Impact
  • T1598 - Phishing for Information
  • T1213.003 - Code Repositories
  • T1018 - Remote System Discovery
MITREへのリンク →

Storm-0501

Score: 7.94
Matched TTPs:
  • T1484.002 - Trust Modification
  • T1190 - Exploit Public-Facing Application
  • T1486 - Data Encrypted for Impact
MITREへのリンク →

FIN6

Score: 17.80
Matched TTPs:
  • T1213.006 - Databases
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1059.003 - Windows Command Shell
  • T1134 - Access Token Manipulation
  • T1018 - Remote System Discovery
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Sidewinder

Score: 12.64
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1016 - System Network Configuration Discovery
  • T1218.005 - Mshta
  • T1598.002 - Spearphishing Attachment
  • T1518 - Software Discovery
MITREへのリンク →

Silent Librarian

Score: 10.01
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1585.002 - Email Accounts
  • T1608.005 - Link Target
  • T1078 - Valid Accounts
MITREへのリンク →

ZIRCONIUM

Score: 12.39
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1016 - System Network Configuration Discovery
  • T1041 - Exfiltration Over C2 Channel
  • T1068 - Exploitation for Privilege Escalation
  • T1598 - Phishing for Information
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Star Blizzard

Score: 14.69
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1608.001 - Upload Malware
  • T1589 - Gather Victim Identity Information
  • T1585.002 - Email Accounts
  • T1598.002 - Spearphishing Attachment
  • T1078 - Valid Accounts
MITREへのリンク →

CURIUM

Score: 12.77
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1505.003 - Web Shell
  • T1585.002 - Email Accounts
  • T1041 - Exfiltration Over C2 Channel
  • T1189 - Drive-by Compromise
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Patchwork

Score: 5.18
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
MITREへのリンク →

Poseidon Group

Score: 4.26
Matched TTPs:
  • T1007 - System Service Discovery
  • T1049 - System Network Connections Discovery
MITREへのリンク →

admin@338

Score: 6.68
Matched TTPs:
  • T1007 - System Service Discovery
  • T1016 - System Network Configuration Discovery
  • T1049 - System Network Connections Discovery
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Strider

Score: 8.26
Matched TTPs:
  • T1556.002 - Password Filter DLL
  • T1564.005 - Hidden File System
MITREへのリンク →

Medusa Group

Score: 21.88
Matched TTPs:
  • T1106 - Native API
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1585.002 - Email Accounts
  • T1016 - System Network Configuration Discovery
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
  • T1650 - Acquire Access
  • T1018 - Remote System Discovery
MITREへのリンク →

Higaisa

Score: 6.68
Matched TTPs:
  • T1106 - Native API
  • T1016 - System Network Configuration Discovery
  • T1041 - Exfiltration Over C2 Channel
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Gorgon Group

Score: 5.04
Matched TTPs:
  • T1106 - Native API
  • T1562.001 - Disable or Modify Tools
  • T1059.003 - Windows Command Shell
MITREへのリンク →

BlackTech

Score: 3.76
Matched TTPs:
  • T1106 - Native API
  • T1190 - Exploit Public-Facing Application
MITREへのリンク →

SideCopy

Score: 14.44
Matched TTPs:
  • T1106 - Native API
  • T1608.001 - Upload Malware
  • T1016 - System Network Configuration Discovery
  • T1218.005 - Mshta
  • T1598.002 - Spearphishing Attachment
  • T1518 - Software Discovery
MITREへのリンク →

APT37

Score: 9.14
Matched TTPs:
  • T1106 - Native API
  • T1036.001 - Invalid Code Signature
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
MITREへのリンク →

Gamaredon Group

Score: 17.98
Matched TTPs:
  • T1106 - Native API
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1218.005 - Mshta
  • T1041 - Exfiltration Over C2 Channel
  • T1562.001 - Disable or Modify Tools
  • T1027.004 - Compile After Delivery
  • T1059.003 - Windows Command Shell
MITREへのリンク →

TA505

Score: 11.88
Matched TTPs:
  • T1106 - Native API
  • T1608.001 - Upload Malware
  • T1552.001 - Credentials In Files
  • T1562.001 - Disable or Modify Tools
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Silence

Score: 6.21
Matched TTPs:
  • T1106 - Native API
  • T1078 - Valid Accounts
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

TA2541

Score: 6.11
Matched TTPs:
  • T1608.001 - Upload Malware
  • T1218.005 - Mshta
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

BlackByte

Score: 22.94
Matched TTPs:
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1016 - System Network Configuration Discovery
  • T1134.003 - Make and Impersonate Token
  • T1041 - Exfiltration Over C2 Channel
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
  • T1018 - Remote System Discovery
MITREへのリンク →

BITTER

Score: 4.07
Matched TTPs:
  • T1608.001 - Upload Malware
  • T1068 - Exploitation for Privilege Escalation
MITREへのリンク →

Saint Bear

Score: 4.72
Matched TTPs:
  • T1608.001 - Upload Malware
  • T1562.001 - Disable or Modify Tools
  • T1059.003 - Windows Command Shell
MITREへのリンク →

EXOTIC LILY

Score: 10.63
Matched TTPs:
  • T1608.001 - Upload Malware
  • T1585.002 - Email Accounts
  • T1593.001 - Social Media
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Rocke

Score: 11.26
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1059.004 - Unix Shell
  • T1562.001 - Disable or Modify Tools
  • T1027.004 - Compile After Delivery
  • T1018 - Remote System Discovery
MITREへのリンク →

BackdoorDiplomacy

Score: 4.97
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1049 - System Network Connections Discovery
MITREへのリンク →

Cinnamon Tempest

Score: 3.85
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1078 - Valid Accounts
  • T1059.003 - Windows Command Shell
MITREへのリンク →

Blue Mockingbird

Score: 6.27
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1059.003 - Windows Command Shell
  • T1134 - Access Token Manipulation
MITREへのリンク →

Winter Vivern

Score: 6.16
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1041 - Exfiltration Over C2 Channel
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
MITREへのリンク →

Leviathan

Score: 14.53
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1585.002 - Email Accounts
  • T1041 - Exfiltration Over C2 Channel
  • T1078 - Valid Accounts
  • T1587.004 - Exploits
  • T1189 - Drive-by Compromise
MITREへのリンク →

Volatile Cedar

Score: 7.37
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1595.003 - Wordlist Scanning
MITREへのリンク →

LAPSUS$

Score: 14.43
Matched TTPs:
  • T1589 - Gather Victim Identity Information
  • T1598.004 - Spearphishing Voice
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1213.003 - Code Repositories
MITREへのリンク →

Deep Panda

Score: 6.59
Matched TTPs:
  • T1505.003 - Web Shell
  • T1546.008 - Accessibility Features
  • T1018 - Remote System Discovery
MITREへのリンク →

APT19

Score: 3.24
Matched TTPs:
  • T1016 - System Network Configuration Discovery
  • T1189 - Drive-by Compromise
MITREへのリンク →

Stealth Falcon

Score: 3.44
Matched TTPs:
  • T1016 - System Network Configuration Discovery
  • T1041 - Exfiltration Over C2 Channel
MITREへのリンク →

Naikon

Score: 3.01
Matched TTPs:
  • T1016 - System Network Configuration Discovery
  • T1018 - Remote System Discovery
MITREへのリンク →

Andariel

Score: 3.50
Matched TTPs:
  • T1049 - System Network Connections Discovery
  • T1189 - Drive-by Compromise
MITREへのリンク →

Velvet Ant

Score: 6.36
Matched TTPs:
  • T1049 - System Network Connections Discovery
  • T1059.004 - Unix Shell
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

Leafminer

Score: 5.83
Matched TTPs:
  • T1552.001 - Credentials In Files
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
MITREへのリンク →

Inception

Score: 5.09
Matched TTPs:
  • T1218.005 - Mshta
  • T1518 - Software Discovery
MITREへのリンク →

Confucius

Score: 4.31
Matched TTPs:
  • T1218.005 - Mshta
  • T1041 - Exfiltration Over C2 Channel
MITREへのリンク →

TA551

Score: 3.30
Matched TTPs:
  • T1218.005 - Mshta
  • T1059.003 - Windows Command Shell
MITREへのリンク →

PROMETHIUM

Score: 5.90
Matched TTPs:
  • T1205.001 - Port Knocking
  • T1189 - Drive-by Compromise
MITREへのリンク →

Windshift

Score: 11.17
Matched TTPs:
  • T1036.001 - Invalid Code Signature
  • T1189 - Drive-by Compromise
  • T1518 - Software Discovery
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

DarkHydrus

Score: 4.13
Matched TTPs:
  • T1187 - Forced Authentication
MITREへのリンク →

Storm-1811

Score: 5.82
Matched TTPs:
  • T1486 - Data Encrypted for Impact
  • T1059.003 - Windows Command Shell
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Dark Caracal

Score: 5.24
Matched TTPs:
  • T1059.003 - Windows Command Shell
  • T1189 - Drive-by Compromise
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

DarkVishnya

Score: 4.54
Matched TTPs:
  • T1200 - Hardware Additions
MITREへのリンク →

Windigo

Score: 4.51
Matched TTPs:
  • T1189 - Drive-by Compromise
  • T1518 - Software Discovery
MITREへのリンク →

Equation

Score: 4.13
Matched TTPs:
  • T1564.005 - Hidden File System
MITREへのリンク →

このPulseに関連する脅威アクター (推論ベース)

Kimsuky

Score: 0.70
Matched TTPs:
  • T1588.005 - Exploits
  • T1059.003 - Windows Command Shell
  • T1608.001 - Upload Malware
  • T1585.002 - Email Accounts
  • T1593.001 - Social Media
  • T1557 - Adversary-in-the-Middle
  • T1056.001 - Keylogging
  • T1552.001 - Credentials In Files
  • T1041 - Exfiltration Over C2 Channel
  • T1505.003 - Web Shell
  • T1007 - System Service Discovery
  • T1587.001 - Malware
  • T1598 - Phishing for Information
  • T1016 - System Network Configuration Discovery
  • T1598.003 - Spearphishing Link
  • T1218.005 - Mshta
  • T1562.001 - Disable or Modify Tools
  • T1190 - Exploit Public-Facing Application
  • T1550.002 - Pass the Hash
  • T1560.001 - Archive via Utility
  • T1591 - Gather Victim Org Information
MITREへのリンク →

Volt Typhoon

Score: 0.64
Matched TTPs:
  • T1059.003 - Windows Command Shell
  • T1587.004 - Exploits
  • T1589 - Gather Victim Identity Information
  • T1056.001 - Keylogging
  • T1010 - Application Window Discovery
  • T1505.003 - Web Shell
  • T1007 - System Service Discovery
  • T1049 - System Network Connections Discovery
  • T1016 - System Network Configuration Discovery
  • T1059.004 - Unix Shell
  • T1190 - Exploit Public-Facing Application
  • T1518 - Software Discovery
  • T1068 - Exploitation for Privilege Escalation
  • T1560.001 - Archive via Utility
  • T1596.005 - Scan Databases
  • T1584.003 - Virtual Private Server
  • T1078 - Valid Accounts
  • T1591 - Gather Victim Org Information
  • T1018 - Remote System Discovery
MITREへのリンク →

Scattered Spider

Score: 0.60
Matched TTPs:
  • T1070.008 - Clear Mailbox Data
  • T1016 - System Network Configuration Discovery
  • T1598.003 - Spearphishing Link
  • T1589 - Gather Victim Identity Information
  • T1562.001 - Disable or Modify Tools
  • T1068 - Exploitation for Privilege Escalation
  • T1213.003 - Code Repositories
  • T1059.004 - Unix Shell
  • T1078 - Valid Accounts
  • T1598.004 - Spearphishing Voice
  • T1018 - Remote System Discovery
  • T1552.001 - Credentials In Files
  • T1486 - Data Encrypted for Impact
  • T1484.002 - Trust Modification
  • T1598 - Phishing for Information
  • T1041 - Exfiltration Over C2 Channel
MITREへのリンク →

APT41

Score: 0.57
Matched TTPs:
  • T1059.003 - Windows Command Shell
  • T1071.004 - DNS
  • T1550.002 - Pass the Hash
  • T1546.008 - Accessibility Features
  • T1016 - System Network Configuration Discovery
  • T1560.001 - Archive via Utility
  • T1596.005 - Scan Databases
  • T1059.004 - Unix Shell
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
  • T1595.003 - Wordlist Scanning
  • T1056.001 - Keylogging
  • T1486 - Data Encrypted for Impact
  • T1190 - Exploit Public-Facing Application
  • T1213.003 - Code Repositories
  • T1049 - System Network Connections Discovery
  • T1003.002 - Security Account Manager
MITREへのリンク →

Related CVEs

このPulseに見つかったCVEはありません。

Pulse – 脅威アクター グラフ


← Pulse一覧に戻る