Prestige ransomware has been used by Sandworm Team since at least March 2022, including against transportation and related logistics industries in Ukraine and Poland in October 2022.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Prestige can use PowerShell for payload execution on targeted systems.[1] |
Enterprise | T1486 | Data Encrypted for Impact |
Prestige has leveraged the CryptoPP C++ library to encrypt files on target systems using AES and appended filenames with |
|
Enterprise | T1484 | .001 | Domain or Tenant Policy Modification: Group Policy Modification |
Prestige has been deployed using the Default Domain Group Policy Object from an Active Directory Domain Controller.[1] |
Enterprise | T1083 | File and Directory Discovery |
Prestige can traverse the file system to discover files to encrypt by identifying specific extensions defined in a hardcoded list.[1] |
|
Enterprise | T1490 | Inhibit System Recovery |
Prestige can delete the backup catalog from the target system using: |
|
Enterprise | T1112 | Modify Registry |
Prestige has the ability to register new registry keys for a new extension handler via |
|
Enterprise | T1106 | Native API |
Prestige has used the |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Prestige has been executed on a target system through a scheduled task created by Sandworm Team using Impacket.[1] |
Enterprise | T1489 | Service Stop |
Prestige has attempted to stop the MSSQL Windows service to ensure successful encryption using |
ID | Name | References |
---|---|---|
G0034 | Sandworm Team |