G0001 Axiom
Axiom is a suspected Chinese cyber espionage group that has targeted the aerospace, defense, government, manufacturing, and media sectors since at least 2008. Some reporting suggests a degree of overlap between Axiom and Winnti Group but the two groups appear to be distinct based on differences in reporting on TTPs and targeting.253
Item | Value |
---|---|
ID | G0001 |
Associated Names | Group 72 |
Version | 2.0 |
Created | 31 May 2017 |
Last Modified | 20 March 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
Group 72 | 1 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1583 | Acquire Infrastructure | - |
enterprise | T1583.002 | DNS Server | Axiom has acquired dynamic DNS services for use in the targeting of intended victims.4 |
enterprise | T1583.003 | Virtual Private Server | Axiom has used VPS hosting providers in targeting of intended victims.4 |
enterprise | T1560 | Archive Collected Data | Axiom has compressed and encrypted data prior to exfiltration.4 |
enterprise | T1584 | Compromise Infrastructure | - |
enterprise | T1584.005 | Botnet | Axiom has used large groups of compromised machines for use as proxy nodes.4 |
enterprise | T1005 | Data from Local System | Axiom has collected data from a compromised network.4 |
enterprise | T1001 | Data Obfuscation | - |
enterprise | T1001.002 | Steganography | Axiom has used steganography to hide its C2 communications.4 |
enterprise | T1189 | Drive-by Compromise | Axiom has used watering hole attacks to gain access.1 |
enterprise | T1546 | Event Triggered Execution | - |
enterprise | T1546.008 | Accessibility Features | Axiom actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence.4 |
enterprise | T1190 | Exploit Public-Facing Application | Axiom has been observed using SQL injection to gain access to systems.41 |
enterprise | T1203 | Exploitation for Client Execution | Axiom has used exploits for multiple vulnerabilities including CVE-2014-0322, CVE-2012-4792, CVE-2012-1889, and CVE-2013-3893.1 |
enterprise | T1003 | OS Credential Dumping | Axiom has been known to dump credentials.4 |
enterprise | T1566 | Phishing | Axiom has used spear phishing to initially compromise victims.14 |
enterprise | T1563 | Remote Service Session Hijacking | - |
enterprise | T1563.002 | RDP Hijacking | Axiom has targeted victims with remote administration tools including RDP.4 |
enterprise | T1021 | Remote Services | - |
enterprise | T1021.001 | Remote Desktop Protocol | Axiom has used RDP during operations.4 |
enterprise | T1553 | Subvert Trust Controls | Axiom has used digital certificates to deliver malware.4 |
enterprise | T1078 | Valid Accounts | Axiom has used previously compromised administrative accounts to escalate privileges.4 |
Software
References
-
Esler, J., Lee, M., and Williams, C. (2014, October 14). Threat Spotlight: Group 72. Retrieved January 14, 2016. ↩↩↩↩↩↩↩↩↩↩↩↩
-
Kaspersky Lab’s Global Research and Analysis Team. (2013, April 11). Winnti. More than just a game. Retrieved February 8, 2017. ↩
-
Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017. ↩
-
Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016. ↩
-
Allievi, A., et al. (2014, October 28). Threat Spotlight: Group 72, Opening the ZxShell. Retrieved September 24, 2019. ↩