Operation CuckooBees was a cyber espionage campaign targeting technology and manufacturing companies in East Asia, Western Europe, and North America since at least 2019. Security researchers noted the goal of Operation CuckooBees, which was still ongoing as of May 2022, was likely the theft of proprietary information, research and development documents, source code, and blueprints for various technologies. Researchers assessed Operation CuckooBees was conducted by actors affiliated with Winnti Group, APT41, and BARIUM.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .001 | Account Discovery: Local Account |
During Operation CuckooBees, the threat actors used the |
.002 | Account Discovery: Domain Account |
During Operation CuckooBees, the threat actors used the |
||
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
During Operation CuckooBees, the threat actors enabled HTTP and HTTPS listeners.[1] |
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
During Operation CuckooBees, the threat actors used the Makecab utility to compress and a version of WinRAR to create password-protected archives of stolen data prior to exfiltration.[1] |
Enterprise | T1547 | .006 | Boot or Logon Autostart Execution: Kernel Modules and Extensions |
During Operation CuckooBees, attackers used a signed kernel rootkit to establish additional persistence.[1] |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
During Operation CuckooBees, the threat actors used batch scripts to perform reconnaissance.[1] |
.005 | Command and Scripting Interpreter: Visual Basic |
During Operation CuckooBees, the threat actors executed an encoded VBScript file using |
||
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
During Operation CuckooBees, the threat actors modified the |
Enterprise | T1005 | Data from Local System |
During Operation CuckooBees, the threat actors collected data, files, and other information from compromised networks.[1] |
|
Enterprise | T1190 | Exploit Public-Facing Application |
During Operation CuckooBees, the threat actors exploited multiple vulnerabilities in externally facing servers.[1] |
|
Enterprise | T1133 | External Remote Services |
During Operation CuckooBees, the threat actors enabled WinRM over HTTP/HTTPS as a backup persistence mechanism using the following command: |
|
Enterprise | T1083 | File and Directory Discovery |
During Operation CuckooBees, the threat actors used |
|
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
During Operation CuckooBees, the threat actors used the legitimate Windows services |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
During Operation CuckooBees, the threat actors renamed a malicious executable to |
Enterprise | T1135 | Network Share Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1027 | .010 | Obfuscated Files or Information: Command Obfuscation |
During Operation CuckooBees, the threat actors executed an encoded VBScript file.[1] |
.011 | Obfuscated Files or Information: Fileless Storage |
During Operation CuckooBees, the threat actors stroed payloads in Windows CLFS (Common Log File System) transactional logs.[1] |
||
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
For Operation CuckooBees, the threat actors obtained publicly-available JSP code that was used to deploy a webshell onto a compromised server.[1] |
Enterprise | T1003 | .002 | OS Credential Dumping: Security Account Manager |
During Operation CuckooBees, the threat actors leveraged a custom tool to dump OS credentials and used following commands: |
Enterprise | T1201 | Password Policy Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1120 | Peripheral Device Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1069 | .001 | Permission Groups Discovery: Local Groups |
During Operation CuckooBees, the threat actors used the |
Enterprise | T1057 | Process Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1018 | Remote System Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
During Operation CuckooBees, the threat actors used scheduled tasks to execute batch scripts for lateral movement with the following command: |
Enterprise | T1505 | .003 | Server Software Component: Web Shell |
During Operation CuckooBees, the threat actors generated a web shell within a vulnerable Enterprise Resource Planning Web Application Server as a persistence mechanism.[1] |
Enterprise | T1082 | System Information Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1016 | System Network Configuration Discovery |
During Operation CuckooBees, the threat actors used |
|
Enterprise | T1049 | System Network Connections Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1033 | System Owner/User Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1007 | System Service Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1124 | System Time Discovery |
During Operation CuckooBees, the threat actors used the |
|
Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts |
During Operation CuckooBees, the threat actors used compromised domain administrator credentials as part of their lateral movement.[1] |