C0032 was an extended campaign suspected to involve the Triton adversaries with related capabilities and techniques focused on gaining a foothold within IT environments. This campaign occurred in 2019 and was distinctly different from the Triton Safety Instrumented System Attack.[1]
ID | Name | Description |
---|---|---|
G0088 | TEMP.Veles |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .003 | Acquire Infrastructure: Virtual Private Server |
During the C0032 campaign, TEMP.Veles used Virtual Private Server (VPS) infrastructure.[1] |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
During the C0032 campaign, TEMP.Veles used PowerShell to perform timestomping.[1] |
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
During the C0032 campaign, TEMP.Veles used staging folders that are infrequently used by legitimate users or processes to store data for exfiltration and tool deployment.[1] |
Enterprise | T1546 | .012 | Event Triggered Execution: Image File Execution Options Injection |
During the C0032 campaign, TEMP.Veles modified and added entries within |
Enterprise | T1133 | External Remote Services |
During the C0032 campaign, TEMP.Veles used VPN access to persist in the victim environment.[1] |
|
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
During the C0032 campaign, TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.[1] |
.006 | Indicator Removal: Timestomp |
During the C0032 campaign, TEMP.Veles used timestomping to modify the |
||
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
During the C0032 campaign, TEMP.Veles renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.[1] |
Enterprise | T1571 | Non-Standard Port |
During the C0032 campaign, TEMP.Veles used port-protocol mismatches on ports such as 443, 4444, 8531, and 50501 during C2.[1] |
|
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
During the C0032 campaign, TEMP.Veles obtained and used tools such as Mimikatz and PsExec.[1] |
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
During the C0032 campaign, TEMP.Veles used Mimikatz and a custom tool, SecHack, to harvest credentials.[1] |
Enterprise | T1572 | Protocol Tunneling |
During the C0032 campaign, TEMP.Veles used encrypted SSH-based PLINK tunnels to transfer tools and enable RDP connections throughout the environment.[1] |
|
Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol |
During the C0032 campaign, TEMP.Veles utilized RDP throughout an operation.[1] |
.004 | Remote Services: SSH |
During the C0032 campaign, TEMP.Veles relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.[1] |
||
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
During the C0032 campaign, TEMP.Veles used scheduled task XML triggers.[1] |
Enterprise | T1505 | .003 | Server Software Component: Web Shell |
During the C0032 campaign, TEMP.Veles planted Web shells on Outlook Exchange servers.[1] |
Enterprise | T1078 | Valid Accounts |
During the C0032 campaign, TEMP.Veles used compromised VPN accounts.[1] |