Skip to content

C0016 Operation Dust Storm

Operation Dust Storm was a long-standing persistent cyber espionage campaign that targeted multiple industries in Japan, South Korea, the United States, Europe, and several Southeast Asian countries. By 2015, the Operation Dust Storm threat actors shifted from government and defense-related intelligence targets to Japanese companies or Japanese subdivisions of larger foreign organizations supporting Japan’s critical infrastructure, including electricity generation, oil and natural gas, finance, transportation, and construction.1

Operation Dust Storm threat actors also began to use Android backdoors in their operations by 2015, with all identified victims at the time residing in Japan or South Korea.1

Item Value
ID C0016
Associated Names
First Seen January 2010
Last Seen February 2016
Version 1.0
Created 29 September 2022
Last Modified 30 September 2022
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1583 Acquire Infrastructure -
enterprise T1583.001 Domains For Operation Dust Storm, the threat actors established domains as part of their operational infrastructure.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.005 Visual Basic During Operation Dust Storm, the threat actors used Visual Basic scripts.1
enterprise T1059.007 JavaScript During Operation Dust Storm, the threat actors used JavaScript code.1
enterprise T1140 Deobfuscate/Decode Files or Information During Operation Dust Storm, attackers used VBS code to decode payloads.1
enterprise T1189 Drive-by Compromise During Operation Dust Storm, the threat actors used a watering hole attack on a popular software reseller to exploit the then-zero-day Internet Explorer vulnerability CVE-2014-0322.1
enterprise T1568 Dynamic Resolution For Operation Dust Storm, the threat actors used dynamic DNS domains from a variety of free providers, including No-IP, Oray, and 3322.1
enterprise T1585 Establish Accounts -
enterprise T1585.002 Email Accounts For Operation Dust Storm, the threat actors established email addresses to register domains for their operations.1
enterprise T1203 Exploitation for Client Execution During Operation Dust Storm, the threat actors exploited Adobe Flash vulnerability CVE-2011-0611, Microsoft Windows Help vulnerability CVE-2010-1885, and several Internet Explorer vulnerabilities, including CVE-2011-1255, CVE-2012-1889, and CVE-2014-0322.1
enterprise T1036 Masquerading For Operation Dust Storm, the threat actors disguised some executables as JPG files.1
enterprise T1027 Obfuscated Files or Information During Operation Dust Storm, the threat actors encoded some payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key; other payloads were Base64-encoded.1
enterprise T1027.002 Software Packing For Operation Dust Storm, the threat actors used UPX to pack some payloads.1
enterprise T1566 Phishing -
enterprise T1566.001 Spearphishing Attachment During Operation Dust Storm, the threat actors sent spearphishing emails that contained a malicious Microsoft Word document.1
enterprise T1566.002 Spearphishing Link During Operation Dust Storm, the threat actors sent spearphishing emails containing a malicious link.1
enterprise T1518 Software Discovery During Operation Dust Storm, the threat actors deployed a file called DeployJava.js to fingerprint installed software on a victim system prior to exploit delivery.1
enterprise T1218 System Binary Proxy Execution -
enterprise T1218.005 Mshta During Operation Dust Storm, the threat actors executed JavaScript code via mshta.exe.1
enterprise T1204 User Execution -
enterprise T1204.001 Malicious Link During Operation Dust Storm, the threat actors relied on a victim clicking on a malicious link sent via email.1
enterprise T1204.002 Malicious File During Operation Dust Storm, the threat actors relied on potential victims to open a malicious Microsoft Word document sent via email.1
mobile T1533 Data from Local System During Operation Dust Storm, the threat actors used Android backdoors capable of exfiltrating specific files directly from the infected devices.1
mobile T1646 Exfiltration Over C2 Channel During Operation Dust Storm, the threat actors used Android backdoors that would send information and data from a victim’s mobile device to the C2 servers.1
mobile T1420 File and Directory Discovery During Operation Dust Storm, the threat actors used Android backdoors capable of enumerating specific files on the infected devices.1
mobile T1636 Protected User Data -
mobile T1636.004 SMS Messages During Operation Dust Storm, the threat actors used Android backdoors to continually forward all SMS messages and call information back to their C2 servers.1

Software

ID Name Description
S0032 gh0st RAT 1

References