Operation Digital Eye was conducted in June and July of 2024 by suspected People's Republic of China (PRC)-nexus threat actors targeting business-to-business IT service providers in Southern Europe. Operation Digital Eye activity included the use of Visual Studio Code tunnels for command and control (C2) and custom lateral movement capabilities. Overlaps in tooling between Digital Eye and previous China-nexus campaigns, Operation Soft Cell and Operation Tainted Love, indicate the potential use of shared vendors or digital quartermasters.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1087 | .001 | Account Discovery: Local Account |
During Operation Digital Eye, threat actors used the local.exe tool to view local account information.[1] |
| Enterprise | T1098 | .004 | Account Manipulation: SSH Authorized Keys |
During Operation Digital Eye, threat actors used SSH access enabled by authorized_keys files for remote execution.[1] |
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
During Operation Digital Eye, threat actors used |
| Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
During Operation Digital Eye, threat actors created a service named Visual Studio Code Service to run Visual Studio code.[1] |
| Enterprise | T1190 | Exploit Public-Facing Application |
During Operation Digital Eye, threat actors used SQL injection to compromise publicly exposed web and database servers.[1] |
|
| Enterprise | T1591 | Gather Victim Org Information |
During Operation Digital Eye, threat actors concealed malicious activity by using terms that aligned with the technological context of the targeted organization.[1] |
|
| Enterprise | T1665 | Hide Infrastructure |
During Operation Digital Eye, threat actors used public Cloud infrastructure to mask malicious activity.[1] |
|
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
During Operation Digital Eye, threat actors deleted files delivered to compromised hosts, often named with the pattern do.* such as do.exe.[1] |
| Enterprise | T1036 | .005 | Masquerading: Match Legitimate Resource Name or Location |
During Operation Digital Eye, threat actors attempted to make filenames appear legitimate by tailoring them to the victim organization.[1] |
| Enterprise | T1106 | Native API |
During Operation Digital Eye, threat actors used native API such as |
|
| Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
During Operation Digital Eye, threat actors used third party tools including custom implementations of Mimikatz.[1] |
| Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
During Operation Digital Eye, threat actors targeted memory from the LSASS process to extract credentials.[1] |
| .002 | OS Credential Dumping: Security Account Manager |
During Operation Digital Eye, threat actors used |
||
| Enterprise | T1069 | .001 | Permission Groups Discovery: Local Groups |
During Operation Digital Eye, threat actors used the local.exe tool to view group memberships.[1] |
| Enterprise | T1219 | .001 | Remote Access Tools: IDE Tunneling |
During Operation Digital Eye, threat actors created Visual Studio Code dev tunnels to access targeted endpoints through the browser-based version of Visual Studio Code.[1] |
| Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol |
During Operation Digital Eye, threat actors moved laterally using RDP.[1] |
| Enterprise | T1018 | Remote System Discovery |
During Operation Digital Eye, threat actors used Ping for reconnaissance.[1] |
|
| Enterprise | T1505 | .003 | Server Software Component: Web Shell |
During Operation Digital Eye, threat actors deployed a PHP-based webshell to maintain persistent access.[1] |
| Enterprise | T1614 | .001 | System Location Discovery: System Language Discovery |
During Operation Digital Eye, threat actors used the local language of targeted organizations to disguise file system activity.[1] |
| Enterprise | T1033 | System Owner/User Discovery |
During Operation Digital Eye, threat actors used |
|
| Enterprise | T1569 | .002 | System Services: Service Execution |
During Operation Digital Eye, threat actors used the winsw tool to deploy a Visual Studio code executable as a Windows service.[1] |
| Enterprise | T1550 | .002 | Use Alternate Authentication Material: Pass the Hash |
During Operation Digital Eye, threat actors used a pass-the-hash capability to move laterally.[1] |
| ID | Name | Description |
|---|---|---|
| S0002 | Mimikatz |
During Operation Digital Eye, threat actors used custom implementations of Mimikatz.[1] |
| S9028 | PHPsert |
During Operation Digital Eye, threat actors deployed PHPsert to execution and to maintain access.[1] |
| S0097 | Ping |
During Operation Digital Eye, threat actors used Ping for reconnaissance.[1] |
| S0225 | sqlmap |
During Operation Digital Eye, threat actors used (LinkdById: S0225) to automate SQL injection.[1] |