GOLD SOUTHFIELD is a financially motivated threat group active since at least 2018 that operates the REvil Ransomware-as-a Service (RaaS). GOLD SOUTHFIELD provides backend infrastructure for affiliates recruited on underground forums to perpetrate high value deployments. By early 2020, GOLD SOUTHFIELD started capitalizing on the new trend of stealing data and further extorting the victim to pay for their data to not get publicly leaked.[1][2][3][4]
| Name | Description |
|---|---|
| Pinchy Spider |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1195 | .002 | 供应链破坏: Compromise Software Supply Chain |
GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR.[1][2][3] |
| Enterprise | T1199 | 信任关系 |
GOLD SOUTHFIELD has breached Managed Service Providers (MSP's) to deliver malware to MSP customers.[1] |
|
| Enterprise | T1190 | 利用公开应用程序漏洞 |
GOLD SOUTHFIELD has exploited Oracle WebLogic vulnerabilities for initial compromise.[1] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
GOLD SOUTHFIELD has staged and executed PowerShell scripts on compromised hosts.[5] |
| Enterprise | T1133 | 外部远程服务 |
GOLD SOUTHFIELD has used publicly-accessible RDP and remote management and monitoring (RMM) servers to gain access to victim machines.[1] |
|
| Enterprise | T1113 | 屏幕捕获 |
GOLD SOUTHFIELD has used the remote monitoring and management tool ConnectWise to obtain screen captures from victim's machines.[5] |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
GOLD SOUTHFIELD has executed base64 encoded PowerShell scripts on compromised hosts.[5] |
| Enterprise | T1219 | 远程访问软件 |
GOLD SOUTHFIELD has used the cloud-based remote management and monitoring tool "ConnectWise Control" to deploy REvil.[5] |
|
| Enterprise | T1566 | 钓鱼 |
GOLD SOUTHFIELD has conducted malicious spam (malspam) campaigns to gain access to victim's machines.[1] |
|