GALLIUM is a cyberespionage group that has been active since at least 2012, primarily targeting telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam. This group is particularly known for launching Operation Soft Cell, a long-term campaign targeting telecommunications providers.[1] Security researchers have identified GALLIUM as a likely Chinese state-sponsored group, based in part on tools used and TTPs commonly associated with Chinese threat actors.[1][2][3]
| Name | Description |
|---|---|
| Granite Typhoon |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
GALLIUM used WMI for execution to assist in lateral movement as well as for installing tools across multiple assets.[1] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.[1] |
|
| Enterprise | T1090 | .002 | 代理: External Proxy |
GALLIUM used a modified version of HTRAN to redirect connections between networks.[1] |
| Enterprise | T1036 | .003 | 伪装: Rename System Utilities | |
| Enterprise | T1550 | .002 | 使用备用认证材料: Pass the Hash |
GALLIUM used dumped hashes to authenticate to other machines via pass the hash.[1] |
| Enterprise | T1136 | .002 | 创建账户: Domain Account |
GALLIUM created high-privileged domain user accounts to maintain access to victim networks.[1][2] |
| Enterprise | T1190 | 利用公开应用程序漏洞 |
GALLIUM exploited a publicly-facing servers including Wildfly/JBoss servers to gain access to the network.[1][2] |
|
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine.[1] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
GALLIUM used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines.[1] |
| .003 | 命令与脚本解释器: Windows Command Shell |
GALLIUM used the Windows command shell to execute commands.[1] |
||
| Enterprise | T1133 | 外部远程服务 |
GALLIUM has used VPN services, including SoftEther VPN, to access and maintain persistence in victim environments.[1][2] |
|
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
GALLIUM used WinRAR to compress and encrypt stolen data prior to exfiltration.[1][2] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
GALLIUM used a modified version of Mimikatz along with a PowerShell-based Mimikatz to dump credentials on the victim machines.[1][2] |
| .002 | 操作系统凭证转储: Security Account Manager |
GALLIUM used |
||
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
GALLIUM compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration.[1] |
| Enterprise | T1078 | 有效账户 |
GALLIUM leveraged valid accounts to maintain access to a victim network.[1] |
|
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
GALLIUM used Web shells to persist in victim environments and assist in execution and exfiltration.[1][2] |
| Enterprise | T1570 | 横向工具传输 |
GALLIUM has used PsExec to move laterally between hosts in the target network.[2] |
|
| Enterprise | T1027 | 混淆文件或信息 |
GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.[1] |
|
| .002 | Software Packing |
GALLIUM packed some payloads using different types of packers, both known and custom.[1] |
||
| .005 | Indicator Removal from Tools |
GALLIUM ensured each payload had a unique hash, including by using different types of packers.[1] |
||
| Enterprise | T1033 | 系统所有者/用户发现 |
GALLIUM used |
|
| Enterprise | T1049 | 系统网络连接发现 |
GALLIUM used |
|
| Enterprise | T1016 | 系统网络配置发现 |
GALLIUM used |
|
| Enterprise | T1583 | .004 | 获取基础设施: Server |
GALLIUM has used Taiwan-based servers that appear to be exclusive to GALLIUM.[2] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
GALLIUM has used a variety of widely-available tools, which in some cases they modified to add functionality and/or subvert antimalware solutions.[2] |
| Enterprise | T1105 | 输入工具传输 |
GALLIUM dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN.[1][2] |
|
| Enterprise | T1018 | 远程系统发现 |
GALLIUM used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as |
|
| Enterprise | T1041 | 通过C2信道渗出 |
GALLIUM used Web shells and HTRAN for C2 and to exfiltrate data.[1] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
GALLIUM established persistence for PoisonIvy by created a scheduled task.[1] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
GALLIUM has used stolen certificates to sign its tools including those from Whizzimo LLC.[2] |