“suspected south asian cyber espionage threat group that has been active since at least 2013. according to mitre att & ck, the group has targeted government, energy and engineering organizations in pakistan, china, bangladesh and saudi arabia. researchers from eset shared a report…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078.004Cloud Accounts
76%
“and / or google accounts, including information on their families, associates and journalistic sources, ” the researchers said. this android spyware could have allowed the attackers to access and extract victims ’ files, personal contacts, text messages and geolocation, enable de…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
70%
“exfiltrating sensitive files. the sample analysis showed that its maintainers have added new capabilities over the years, indicating the spyware is actively being developed. lookout researchers also discovered live staging servers that are used to distribute prospy samples. these…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
41%
“january 2024. the ngo said the attackers “ invested time and effort to establish a connection with the targets through various channels. ” to do this, they impersonated legitimate people and services using fake accounts and profiles, messages and pages to impersonate people and m…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1111Multi-Factor Authentication Interception
32%
“january 2024. the ngo said the attackers “ invested time and effort to establish a connection with the targets through various channels. ” to do this, they impersonated legitimate people and services using fake accounts and profiles, messages and pages to impersonate people and m…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group