enterprise |
T1583 |
Acquire Infrastructure |
- |
enterprise |
T1583.004 |
Server |
During Night Dragon, threat actors purchased hosted services to use for C2. |
enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
During Night Dragon, threat actors used HTTP for C2. |
enterprise |
T1110 |
Brute Force |
- |
enterprise |
T1110.002 |
Password Cracking |
During Night Dragon, threat actors used Cain & Abel to crack password hashes. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.003 |
Windows Command Shell |
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells. |
enterprise |
T1584 |
Compromise Infrastructure |
- |
enterprise |
T1584.004 |
Server |
During Night Dragon, threat actors compromised web servers to use for C2. |
enterprise |
T1005 |
Data from Local System |
During Night Dragon, the threat actors collected files and other data from compromised systems. |
enterprise |
T1074 |
Data Staged |
- |
enterprise |
T1074.002 |
Remote Data Staging |
During Night Dragon, threat actors copied files to company web servers and subsequently downloaded them. |
enterprise |
T1568 |
Dynamic Resolution |
During Night Dragon, threat actors used dynamic DNS services for C2. |
enterprise |
T1114 |
Email Collection |
- |
enterprise |
T1114.001 |
Local Email Collection |
During Night Dragon, threat actors used RAT malware to exfiltrate email archives. |
enterprise |
T1190 |
Exploit Public-Facing Application |
During Night Dragon, threat actors used SQL injection exploits against extranet web servers to gain access. |
enterprise |
T1133 |
External Remote Services |
During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems. |
enterprise |
T1008 |
Fallback Channels |
During Night Dragon, threat actors used company extranet servers as secondary C2 servers. |
enterprise |
T1083 |
File and Directory Discovery |
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and browse the victim file system. |
enterprise |
T1562 |
Impair Defenses |
- |
enterprise |
T1562.001 |
Disable or Modify Tools |
During Night Dragon, threat actors disabled anti-virus and anti-spyware tools in some instances on the victim’s machines. The actors also disabled proxy settings to allow direct communication from victims to the Internet. |
enterprise |
T1105 |
Ingress Tool Transfer |
During Night Dragon, threat actors used administrative utilities to deliver Trojan components to remote systems. |
enterprise |
T1112 |
Modify Registry |
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and manipulate the Registry. |
enterprise |
T1027 |
Obfuscated Files or Information |
During Night Dragon, threat actors used a DLL that included an XOR-encoded section. |
enterprise |
T1027.002 |
Software Packing |
During Night Dragon, threat actors used software packing in its tools. |
enterprise |
T1588 |
Obtain Capabilities |
- |
enterprise |
T1588.001 |
Malware |
During Night Dragon, threat actors used Trojans from underground hacker websites. |
enterprise |
T1588.002 |
Tool |
During Night Dragon, threat actors obtained and used tools such as gsecdump. |
enterprise |
T1003 |
OS Credential Dumping |
- |
enterprise |
T1003.002 |
Security Account Manager |
During Night Dragon, threat actors dumped account hashes using gsecdump. |
enterprise |
T1566 |
Phishing |
- |
enterprise |
T1566.002 |
Spearphishing Link |
During Night Dragon, threat actors sent spearphishing emails containing links to compromised websites where malware was downloaded. |
enterprise |
T1219 |
Remote Access Software |
During Night Dragon, threat actors used several remote administration tools as persistent infiltration channels. |
enterprise |
T1608 |
Stage Capabilities |
- |
enterprise |
T1608.001 |
Upload Malware |
During Night Dragon, threat actors uploaded commonly available hacker tools to compromised web servers. |
enterprise |
T1033 |
System Owner/User Discovery |
During Night Dragon, threat actors used password cracking and pass-the-hash tools to discover usernames and passwords. |
enterprise |
T1550 |
Use Alternate Authentication Material |
- |
enterprise |
T1550.002 |
Pass the Hash |
During Night Dragon, threat actors used pass-the-hash tools to obtain authenticated access to sensitive internal desktops and servers. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.001 |
Malicious Link |
During Night Dragon, threat actors enticed users to click on links in spearphishing emails to download malware. |
enterprise |
T1078 |
Valid Accounts |
During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems. |
enterprise |
T1078.002 |
Domain Accounts |
During Night Dragon, threat actors used domain accounts to gain further access to victim systems. |