C0032 was an extended campaign suspected to involve the Triton adversaries with related capabilities and techniques focused on gaining a foothold within IT environments. This campaign occurred in 2019 and was distinctly different from the Triton Safety Instrumented System Attack.[1]
| ID | Name | Description |
|---|---|---|
| G0088 | TEMP.Veles |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .012 | 事件触发执行: Image File Execution Options Injection |
During the C0032 campaign, TEMP.Veles modified and added entries within |
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
During the C0032 campaign, TEMP.Veles renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.[1] |
| Enterprise | T1572 | 协议隧道 |
During the C0032 campaign, TEMP.Veles used encrypted SSH-based PLINK tunnels to transfer tools and enable RDP connections throughout the environment.[1] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
During the C0032 campaign, TEMP.Veles used PowerShell to perform timestomping.[1] |
| Enterprise | T1133 | 外部远程服务 |
During the C0032 campaign, TEMP.Veles used VPN access to persist in the victim environment.[1] |
|
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
During the C0032 campaign, TEMP.Veles used Mimikatz and a custom tool, SecHack, to harvest credentials.[1] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
During the C0032 campaign, TEMP.Veles used staging folders that are infrequently used by legitimate users or processes to store data for exfiltration and tool deployment.[1] |
| Enterprise | T1078 | 有效账户 |
During the C0032 campaign, TEMP.Veles used compromised VPN accounts.[1] |
|
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
During the C0032 campaign, TEMP.Veles planted Web shells on Outlook Exchange servers.[1] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
During the C0032 campaign, TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.[1] |
| .006 | 移除指标: Timestomp |
During the C0032 campaign, TEMP.Veles used timestomping to modify the |
||
| Enterprise | T1583 | .003 | 获取基础设施: Virtual Private Server |
During the C0032 campaign, TEMP.Veles used Virtual Private Server (VPS) infrastructure.[1] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
During the C0032 campaign, TEMP.Veles obtained and used tools such as Mimikatz and PsExec.[1] |
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
During the C0032 campaign, TEMP.Veles utilized RDP throughout an operation.[1] |
| .004 | 远程服务: SSH |
During the C0032 campaign, TEMP.Veles relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.[1] |
||
| Enterprise | T1571 | 非标准端口 |
During the C0032 campaign, TEMP.Veles used port-protocol mismatches on ports such as 443, 4444, 8531, and 50501 during C2.[1] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
During the C0032 campaign, TEMP.Veles used scheduled task XML triggers.[1] |