Lotus Blossom is a long-standing threat group largely targeting various entities in Asia since at least 2009. In addition to government and related targets, Lotus Blossom has also targeted entities such as digital certificate issuers.[1][2][3]
Name | Description |
---|---|
DRAGONFISH | |
Spring Dragon | |
RADIUM | |
Raspberry Typhoon | |
Bilbug | |
Thrip |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1134 | Access Token Manipulation |
Lotus Blossom has retrieved process tokens for processes to adjust the privileges of the launch process or other items.[3] |
|
Enterprise | T1087 | .001 | Account Discovery: Local Account |
Lotus Blossom has used commands such as |
.002 | Account Discovery: Domain Account |
Lotus Blossom has used |
||
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
Lotus Blossom has used WinRAR for compressing data in RAR format.[3][2] |
.003 | Archive Collected Data: Archive via Custom Method |
Lotus Blossom has used custom tools to compress and archive data on victim systems.[3] |
||
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
Lotus Blossom has configured tools such as Sagerunex to run as Windows services.[3] |
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
Lotus Blossom has locally staged compressed and archived data for follow-on exfiltration.[3] |
Enterprise | T1482 | Domain Trust Discovery |
Lotus Blossom has used tools such as AdFind to make Active Directory queries.[2] |
|
Enterprise | T1083 | File and Directory Discovery |
Lotus Blossom has used commands such as |
|
Enterprise | T1112 | Modify Registry |
Lotus Blossom has installed tools such as Sagerunex by writing them to the Windows registry.[3] |
|
Enterprise | T1046 | Network Service Discovery |
Lotus Blossom has used port scanners to enumerate services on remote hosts.[2] |
|
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Lotus Blossom has used publicly-available tools such as a Python-based cookie stealer for Chrome browsers, Impacket, and the Venom proxy tool.[3] |
Enterprise | T1090 | .001 | Proxy: Internal Proxy |
Lotus Blossom has used publicly available tools such as the Venom proxy tool to proxy traffic out of victim environments.[3] |
.003 | Proxy: Multi-hop Proxy |
Lotus Blossom has used tools such as the publicly available HTran tool for proxying traffic in victim environments.[3] |
||
Enterprise | T1012 | Query Registry |
Lotus Blossom has run commands such as |
|
Enterprise | T1018 | Remote System Discovery |
Lotus Blossom has used Ping to identify remote systems.[2] |
|
Enterprise | T1539 | Steal Web Session Cookie |
Lotus Blossom has used publicly-available tools to steal cookies from browsers such as Chrome.[3] |
|
Enterprise | T1016 | System Network Configuration Discovery |
Lotus Blossom has used commands such as |
|
.001 | Internet Connection Discovery |
Lotus Blossom has performed checks to determine if a victim machine is able to access the Internet.[3] |
||
Enterprise | T1049 | System Network Connections Discovery |
Lotus Blossom has used commands such as |
|
Enterprise | T1047 | Windows Management Instrumentation |
Lotus Blossom has used WMI to enable lateral movement.[3] |