otx.alienvault.com
Open in
urlscan Pro
143.204.98.16
Public Scan
URL:
https://otx.alienvault.com/pulse/615ad64300815de81c1d3699/edit?utm_userid=swimlanecyou&utm_content=email&utm_campaign=new_p...
Submission: On October 04 via api from US — Scanned from DE
Submission: On October 04 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
× * Browse * Scan Endpoints * Create Pulse * Submit Sample * API Integration * Login | Sign Up All * Login | Sign Up * Share Actions Subscribers (159801) Suggest Edit Clone Embed Download Report Spam MASTERS OF MIMICRY: NEW APT GROUP CHAMELGANG AND ITS ARSENAL * Created 33 minutes ago by AlienVault * Public * TLP: White In Q2 2021, the PT Expert Security Center incident response team conducted an investigation in an energy company. The investigation revealed that the company's network had been compromised by an unknown group for the purpose of data theft. They gave the group the name ChamelGang (from the word "chameleon"), because the group disguised its malware and network infrastructure under legitimate services of Microsoft, TrendMicro, McAfee, IBM, and Google. The attackers employed two methods. They acquired domains that imitate legitimate ones (newtrendmicro.com, centralgoogle.com, microsoft-support.net, cdn-chrome.com, mcafee-upgrade.com). In addition, the APT group placed SSL certificates that also imitated legitimate ones (github.com, www.ibm.com, jquery.com, update.microsoft-support.net) on its servers. To achieve their goal, the attackers used a trending penetration method—supply chain. The group compromised a subsidiary and penetrated the target company's network through it. Reference: https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/new-apt-group-chamelgang/ Tags: cobalt strike, doorme, beaconloader, chamelgang, doorme backdoor, apt group, oilrig, powershell Adversary: ChamelGang Industries: Government, Aviation Malware Families: Cobalt Strike , DoorMe , BeaconLoader Att&ck IDs: T1114 - Email Collection , T1187 - Forced Authentication , T1547 - Boot or Logon Autostart Execution , T1056 - Input Capture , T1021 - Remote Services , T1012 - Query Registry , T1016 - System Network Configuration Discovery , T1018 - Remote System Discovery , T1036 - Masquerading , T1041 - Exfiltration Over C2 Channel , T1047 - Windows Management Instrumentation , T1049 - System Network Connections Discovery , T1055 - Process Injection , T1057 - Process Discovery , T1059 - Command and Scripting Interpreter , T1068 - Exploitation for Privilege Escalation , T1069 - Permission Groups Discovery , T1070 - Indicator Removal on Host , T1071 - Application Layer Protocol , T1078 - Valid Accounts , T1082 - System Information Discovery , T1087 - Account Discovery , T1090 - Proxy , T1105 - Ingress Tool Transfer , T1140 - Deobfuscate/Decode Files or Information , T1190 - Exploit Public-Facing Application , T1199 - Trusted Relationship , T1210 - Exploitation of Remote Services , T1218 - Signed Binary Proxy Execution , T1505 - Server Software Component , T1560 - Archive Collected Data , T1564 - Hide Artifacts , T1572 - Protocol Tunneling , T1574 - Hijack Execution Flow , T1583 - Acquire Infrastructure , T1587 - Develop Capabilities , T1588 - Obtain Capabilities Endpoint Security Scan your endpoints for IOCs from this Pulse! Learn more * Indicators of Compromise (189) * Related Pulses (8) * Comments (0) * History (0) COMMENTS You must be logged in to leave a comment. Refresh Comments * © Copyright 2021 AlienVault, Inc. * Legal * Status