HAFNIUM is a likely state-sponsored cyber espionage group operating out of China that has been active since at least January 2021. HAFNIUM primarily targets entities in the US across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs. HAFNIUM has targeted remote management tools and cloud software for intial access and has demonstrated an ability to quickly operationalize exploits for identified vulnerabilities in edge devices.[1][2][3]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1098 | Account Manipulation |
HAFNIUM has granted privileges to domain accounts and reset the password for default admin accounts.[2][3] |
|
Enterprise | T1583 | .003 | Acquire Infrastructure: Virtual Private Server |
HAFNIUM has operated from leased virtual private servers (VPS) in the United States.[1] |
.005 | Acquire Infrastructure: Botnet |
HAFNIUM has incorporated leased devices into covert networks to obfuscate communications.[3] |
||
.006 | Acquire Infrastructure: Web Services |
HAFNIUM has acquired web services for use in C2 and exfiltration.[1] |
||
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
HAFNIUM has used open-source C2 frameworks, including Covenant.[1] |
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
HAFNIUM has used 7-Zip and WinRAR to compress stolen files for exfiltration.[1][2] |
Enterprise | T1119 | Automated Collection |
HAFNIUM has used MSGraph to exfiltrate data from email, OneDrive, and SharePoint.[3] |
|
Enterprise | T1110 | .003 | Brute Force: Password Spraying |
HAFNIUM has gained initial access through password spray attacks.[3] |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
HAFNIUM has used the Exchange Power Shell module |
.003 | Command and Scripting Interpreter: Windows Command Shell |
HAFNIUM has used |
||
Enterprise | T1584 | .005 | Compromise Infrastructure: Botnet |
HAFNIUM has used compromised devices in covert networks to obfuscate communications.[3] |
Enterprise | T1136 | .002 | Create Account: Domain Account | |
Enterprise | T1555 | .006 | Credentials from Password Stores: Cloud Secrets Management Stores |
HAFNIUM has moved laterally from on-premises environments to steal passwords from Azure key vaults.[3] |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
Enterprise | T1530 | Data from Cloud Storage | ||
Enterprise | T1213 | .002 | Data from Information Repositories: Sharepoint |
HAFNIUM has abused compromised credentials to exfiltrate data from SharePoint.[3] |
Enterprise | T1005 | Data from Local System |
HAFNIUM has collected data and files from a compromised machine.[5][3] |
|
Enterprise | T1114 | .002 | Email Collection: Remote Email Collection |
HAFNIUM has used web shells and MSGraph to export mailbox data.[1][2][3] |
Enterprise | T1567 | .002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
HAFNIUM has exfiltrated data to file sharing sites, including MEGA.[1] |
Enterprise | T1190 | Exploit Public-Facing Application |
HAFNIUM has exploited multiple vulnerabilities to compromise edge devices and on-premises versions of Microsoft Exchange Server.[1][2][6][7][8][3] |
|
Enterprise | T1068 | Exploitation for Privilege Escalation |
HAFNIUM has targeted unpatched applications to elevate access in targeted organizations.[3] |
|
Enterprise | T1083 | File and Directory Discovery |
HAFNIUM has searched file contents on a compromised host.[5] |
|
Enterprise | T1592 | .004 | Gather Victim Host Information: Client Configurations |
HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.[1] |
Enterprise | T1589 | .002 | Gather Victim Identity Information: Email Addresses |
HAFNIUM has collected e-mail addresses for users they intended to target.[2] |
Enterprise | T1590 | Gather Victim Network Information |
HAFNIUM gathered the fully qualified domain names (FQDNs) for targeted Exchange servers in the victim's environment.[2] |
|
.005 | IP Addresses |
HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.[2] |
||
Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories | |
Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs | |
Enterprise | T1105 | Ingress Tool Transfer |
HAFNIUM has downloaded malware and tools--including Nishang and PowerCat--onto a compromised host.[1][5] |
|
Enterprise | T1095 | Non-Application Layer Protocol | ||
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
HAFNIUM has used |
.003 | OS Credential Dumping: NTDS |
HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT).[2][3] |
||
Enterprise | T1057 | Process Discovery | ||
Enterprise | T1018 | Remote System Discovery |
HAFNIUM has enumerated domain controllers using |
|
Enterprise | T1593 | .003 | Search Open Websites/Domains: Code Repositories |
HAFNIUM has discovered leaked corporate credentials on public repositories including GitHub.[3] |
Enterprise | T1505 | .003 | Server Software Component: Web Shell |
HAFNIUM has deployed multiple web shells on compromised servers including SIMPLESEESHARP, SPORTSBALL, China Chopper, and ASPXSpy.[1][2][6][7][5][3] |
Enterprise | T1218 | .011 | System Binary Proxy Execution: Rundll32 | |
Enterprise | T1016 | System Network Configuration Discovery | ||
.001 | Internet Connection Discovery |
HAFNIUM has checked for network connectivity from a compromised host using |
||
Enterprise | T1033 | System Owner/User Discovery | ||
Enterprise | T1199 | Trusted Relationship |
HAFNIUM has used stolen API keys and credentials associatd with privilege access management (PAM), cloud app providers, and cloud data management companies to access downstream customer environments.[3] |
|
Enterprise | T1550 | .001 | Use Alternate Authentication Material: Application Access Token |
HAFNIUM has abused service principals with administrative permissions for data exfiltration.[3] |
Enterprise | T1078 | .003 | Valid Accounts: Local Accounts |
HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers.[6] |
.004 | Valid Accounts: Cloud Accounts |
HAFNIUM has abused service principals in compromised environments to enable data exfiltration.[3] |